{"title":"The Advancing Cybersecurity Ecosystem of Israel","authors":"Szabolcs Szolnoki, Á. Papp-Váry","doi":"10.4018/978-1-7998-6975-7.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch003","url":null,"abstract":"True to its nickname ‘cyber nation', the country of Israel is seen as a kind of role model in terms of intelligence and defence capabilities by many countries. The present study aims to provide a comprehensive but far from a complete picture of the cyber defence ecosystem of Israel, a country with more than 430 start-ups and unicorns valued at billions of US dollars. The authors outline the major incidents of the recent period, as well as current challenges and threats. The purpose of the chapter is to introduce good practices and cooperation for opportunities to policymakers and cybersecurity experts as well.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124559745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demystifying Global Cybersecurity Threats in Financial Services","authors":"Deepika Dhingra, Shruti Ashok, Utkarsh Kumar","doi":"10.4018/978-1-7998-6975-7.ch010","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch010","url":null,"abstract":"The financial sector across the globe ensures sustainable growth in the economy by mobilizing investments, funds, and savings. This chapter attempts to comprehend the current state of cybersecurity within the financial services industry worldwide. The chapter explores the different aspects of global cyber-attacks in financial sectors to elucidate the salient problems, issues, threats, safeguards, and solutions. As technology is progressing, highly technology-savvy criminals are becoming a new threat in the cybercrime space. The entire industry needs an intense transformation to create innovative, state-of-the-art information, and an up-to-date architecture of cybersecurity that is capable of confronting the continuous tides of cyber-attacks and data breaches on an everyday basis. The use of security tools like proxy servers, firewalls, multi-layered email strategy, virus security software, and effective governance strategies are necessary to protect financial sectors from cyber threats and attacks.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130715136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advancing Artificial Intelligence-Enabled Cybersecurity for the Internet of Things","authors":"A. K. Demir, Shahid Alam","doi":"10.4018/978-1-7998-6975-7.ch007","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch007","url":null,"abstract":"Internet of things (IoT) has revolutionized digital transformation and is present in every sector including transportation, energy, retail, healthcare, agriculture, etc. While stepping into the new digital transformation, these sectors must contemplate the risks involved. The new wave of cyberattacks against IoT is posing a severe impediment in adopting this leading-edge technology. Artificial intelligence (AI) is playing a key role in preventing and mitigating some of the effects of these cyberattacks. This chapter discusses different types of threats and attacks against IoT devices and how AI is enabling the detection and prevention of these cyberattacks. It also presents some challenges faced by AI-enabled detection and prevention and provides some solutions and recommendations to these challenges. The authors believe that this chapter provides a favorable basis for the readers who intend to know more about AI-enabled technologies to detect and prevent cyberattacks against IoT and the motivation to advance the current research in this area.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131853106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of Malware in the Digital Transformation Age","authors":"Shahid Alam","doi":"10.4018/978-1-7998-6975-7.ch013","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch013","url":null,"abstract":"As corporations are stepping into the new digital transformation age and adopting leading-edge technologies such as cloud, mobile, and big data, it becomes crucial for them to contemplate the risks and rewards of this adoption. At the same time, the new wave of malware attacks is posing a severe impediment in implementing these technologies. This chapter discusses some of the complications, challenges, and issues plaguing current malware analysis and detection techniques. Some of the key challenges discussed are automation, native code, obfuscations, morphing, and anti-reverse engineering. Solutions and recommendations are provided to solve some of these challenges. To stimulate further research in this thriving area, the authors highlight some promising future research directions. The authors believe that this chapter provides an auspicious basis for future researchers who intend to know more about the evolution of malware and will act as a motivation for enhancing the current and developing the new techniques for malware analysis and detection.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"59 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120928466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business Management and Strategy in Cybersecurity for Digital Transformation","authors":"F. Özsungur","doi":"10.4018/978-1-7998-6975-7.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch008","url":null,"abstract":"Cyber security threatens vital elements of enterprises such as network, information, application, operational, sustainability, education, and trade secret. Digital transformation and widespread use of IoT caused by the pandemic reveal the importance of cybersecurity vulnerabilities. This study is prepared by a systematic review method for cybersecurity. The inspiration of this chapter is the cyberattacks that threaten the global economy and enterprises and the effects of cybercrime on management and strategy. The cybersecurity problem, which continues to increase with the pandemic in the manufacturing and service sector, is current and becoming a serious threat. This study reveals strategy development against cybersecurity threats; sustainability elements in management; measures to be taken against cybercrime, cyberattack, and cyberterrorism; and organizational and business culture management in digital transformation.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129513520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advancing Cybersecurity for Digital Transformation","authors":"K. Sandhu","doi":"10.4018/978-1-7998-6975-7.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch001","url":null,"abstract":"Advancing cybersecurity for digital transformation provides opportunities and challenges. Many enterprises are accelerating the digital transformation to reach their customers, suppliers, and other parties over the internet; at the same time cybersecurity has become a serious concern. Cyberattacks have exponentially increased globally. While digital transformation makes the business process more efficient and effective, and increased cyberattacks pose obstacles, threats, and risks on the way. Cyberattacks consist of different types such as political, financial, accessing private and confidential information, ransomware, identity theft, destruction to essential infrastructure and public utilities such as energy, water, telecommunication, transportation, health, and others. This chapter presents case analysis from recent cyberattacks to show the scale, size, and type of impacts within and outside the enterprise. Newer technologies to counter cyberattacks are introduced such as quantum computing, nanotechnologies, artificial intelligence, blockchain that have the capabilities to eliminate cyberattacks.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116442304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Romil Rawat, V. Mahor, Anjali Rawat, Bhagwati Garg, Shrikant Telang
{"title":"Digital Transformation of Cyber Crime for Chip-Enabled Hacking","authors":"Romil Rawat, V. Mahor, Anjali Rawat, Bhagwati Garg, Shrikant Telang","doi":"10.4018/978-1-7998-6975-7.ch012","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch012","url":null,"abstract":"The heterogeneous digital arena emerged as the open depiction for malicious activities, and cyber criminals and terrorists are targeting the cyber depiction for controlling its operation. In the dark web (DW), diverse illegal hacking communities are using the sensing-chip webnet to transfer their bots for tracking the user activity so that criminal activities could be accomplished like money laundering, pornography, child trafficking, drug trafficking, arms and ammunition trafficking, where professionals could also be hired and contracted for generating flood infringement and ransomware infringement.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128805995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"My Health Record and Emerging Cybersecurity Challenges in the Australian Digital Environment","authors":"Anita Medhekar","doi":"10.4018/978-1-7998-6975-7.ch005","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch005","url":null,"abstract":"The main aim of embracing evolutionary digital e-health technologies such as ‘My Health Records' is to transform and empower the patients to control their health records, access, choose the right healthcare provider and suitable treatment, when required. It has been a challenge for the healthcare practitioners, hospital staff, as well as patients to accept, embrace, and adopt transformative digital e-health technologies and manage their healthcare records amidst concerns of slow adoption by the patient due to data privacy and cybersecurity issues. Australia, since COVID-19, has stressed the importance of secure online connectivity for the government, business, and the consumers. It is essential that My Health Record platform is cyber-safe, and user-friendly so that consumers feel conformable, safe and secure regarding their personal health records. This chapter discussed the challenges of embracing e-health digital technologies and assurance of advancing cybersecurity of online My Health Record, which will transform e-health provision and empower patients and healthcare providers.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125619375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}