Handbook of Research on Advancing Cybersecurity for Digital Transformation最新文献

筛选
英文 中文
The Advancing Cybersecurity Ecosystem of Israel 以色列先进的网络安全生态系统
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch003
Szabolcs Szolnoki, Á. Papp-Váry
{"title":"The Advancing Cybersecurity Ecosystem of Israel","authors":"Szabolcs Szolnoki, Á. Papp-Váry","doi":"10.4018/978-1-7998-6975-7.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch003","url":null,"abstract":"True to its nickname ‘cyber nation', the country of Israel is seen as a kind of role model in terms of intelligence and defence capabilities by many countries. The present study aims to provide a comprehensive but far from a complete picture of the cyber defence ecosystem of Israel, a country with more than 430 start-ups and unicorns valued at billions of US dollars. The authors outline the major incidents of the recent period, as well as current challenges and threats. The purpose of the chapter is to introduce good practices and cooperation for opportunities to policymakers and cybersecurity experts as well.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124559745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demystifying Global Cybersecurity Threats in Financial Services 揭秘金融服务中的全球网络安全威胁
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch010
Deepika Dhingra, Shruti Ashok, Utkarsh Kumar
{"title":"Demystifying Global Cybersecurity Threats in Financial Services","authors":"Deepika Dhingra, Shruti Ashok, Utkarsh Kumar","doi":"10.4018/978-1-7998-6975-7.ch010","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch010","url":null,"abstract":"The financial sector across the globe ensures sustainable growth in the economy by mobilizing investments, funds, and savings. This chapter attempts to comprehend the current state of cybersecurity within the financial services industry worldwide. The chapter explores the different aspects of global cyber-attacks in financial sectors to elucidate the salient problems, issues, threats, safeguards, and solutions. As technology is progressing, highly technology-savvy criminals are becoming a new threat in the cybercrime space. The entire industry needs an intense transformation to create innovative, state-of-the-art information, and an up-to-date architecture of cybersecurity that is capable of confronting the continuous tides of cyber-attacks and data breaches on an everyday basis. The use of security tools like proxy servers, firewalls, multi-layered email strategy, virus security software, and effective governance strategies are necessary to protect financial sectors from cyber threats and attacks.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130715136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advancing Artificial Intelligence-Enabled Cybersecurity for the Internet of Things 推进物联网的人工智能网络安全
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch007
A. K. Demir, Shahid Alam
{"title":"Advancing Artificial Intelligence-Enabled Cybersecurity for the Internet of Things","authors":"A. K. Demir, Shahid Alam","doi":"10.4018/978-1-7998-6975-7.ch007","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch007","url":null,"abstract":"Internet of things (IoT) has revolutionized digital transformation and is present in every sector including transportation, energy, retail, healthcare, agriculture, etc. While stepping into the new digital transformation, these sectors must contemplate the risks involved. The new wave of cyberattacks against IoT is posing a severe impediment in adopting this leading-edge technology. Artificial intelligence (AI) is playing a key role in preventing and mitigating some of the effects of these cyberattacks. This chapter discusses different types of threats and attacks against IoT devices and how AI is enabling the detection and prevention of these cyberattacks. It also presents some challenges faced by AI-enabled detection and prevention and provides some solutions and recommendations to these challenges. The authors believe that this chapter provides a favorable basis for the readers who intend to know more about AI-enabled technologies to detect and prevent cyberattacks against IoT and the motivation to advance the current research in this area.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131853106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolution of Malware in the Digital Transformation Age 数字转型时代恶意软件的演变
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch013
Shahid Alam
{"title":"Evolution of Malware in the Digital Transformation Age","authors":"Shahid Alam","doi":"10.4018/978-1-7998-6975-7.ch013","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch013","url":null,"abstract":"As corporations are stepping into the new digital transformation age and adopting leading-edge technologies such as cloud, mobile, and big data, it becomes crucial for them to contemplate the risks and rewards of this adoption. At the same time, the new wave of malware attacks is posing a severe impediment in implementing these technologies. This chapter discusses some of the complications, challenges, and issues plaguing current malware analysis and detection techniques. Some of the key challenges discussed are automation, native code, obfuscations, morphing, and anti-reverse engineering. Solutions and recommendations are provided to solve some of these challenges. To stimulate further research in this thriving area, the authors highlight some promising future research directions. The authors believe that this chapter provides an auspicious basis for future researchers who intend to know more about the evolution of malware and will act as a motivation for enhancing the current and developing the new techniques for malware analysis and detection.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"59 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120928466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Management and Strategy in Cybersecurity for Digital Transformation 面向数字化转型的网络安全业务管理与战略
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch008
F. Özsungur
{"title":"Business Management and Strategy in Cybersecurity for Digital Transformation","authors":"F. Özsungur","doi":"10.4018/978-1-7998-6975-7.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch008","url":null,"abstract":"Cyber security threatens vital elements of enterprises such as network, information, application, operational, sustainability, education, and trade secret. Digital transformation and widespread use of IoT caused by the pandemic reveal the importance of cybersecurity vulnerabilities. This study is prepared by a systematic review method for cybersecurity. The inspiration of this chapter is the cyberattacks that threaten the global economy and enterprises and the effects of cybercrime on management and strategy. The cybersecurity problem, which continues to increase with the pandemic in the manufacturing and service sector, is current and becoming a serious threat. This study reveals strategy development against cybersecurity threats; sustainability elements in management; measures to be taken against cybercrime, cyberattack, and cyberterrorism; and organizational and business culture management in digital transformation.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129513520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advancing Cybersecurity for Digital Transformation 推进数字化转型的网络安全
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch001
K. Sandhu
{"title":"Advancing Cybersecurity for Digital Transformation","authors":"K. Sandhu","doi":"10.4018/978-1-7998-6975-7.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch001","url":null,"abstract":"Advancing cybersecurity for digital transformation provides opportunities and challenges. Many enterprises are accelerating the digital transformation to reach their customers, suppliers, and other parties over the internet; at the same time cybersecurity has become a serious concern. Cyberattacks have exponentially increased globally. While digital transformation makes the business process more efficient and effective, and increased cyberattacks pose obstacles, threats, and risks on the way. Cyberattacks consist of different types such as political, financial, accessing private and confidential information, ransomware, identity theft, destruction to essential infrastructure and public utilities such as energy, water, telecommunication, transportation, health, and others. This chapter presents case analysis from recent cyberattacks to show the scale, size, and type of impacts within and outside the enterprise. Newer technologies to counter cyberattacks are introduced such as quantum computing, nanotechnologies, artificial intelligence, blockchain that have the capabilities to eliminate cyberattacks.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116442304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Transformation of Cyber Crime for Chip-Enabled Hacking 面向芯片黑客的网络犯罪数字化转型
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch012
Romil Rawat, V. Mahor, Anjali Rawat, Bhagwati Garg, Shrikant Telang
{"title":"Digital Transformation of Cyber Crime for Chip-Enabled Hacking","authors":"Romil Rawat, V. Mahor, Anjali Rawat, Bhagwati Garg, Shrikant Telang","doi":"10.4018/978-1-7998-6975-7.ch012","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch012","url":null,"abstract":"The heterogeneous digital arena emerged as the open depiction for malicious activities, and cyber criminals and terrorists are targeting the cyber depiction for controlling its operation. In the dark web (DW), diverse illegal hacking communities are using the sensing-chip webnet to transfer their bots for tracking the user activity so that criminal activities could be accomplished like money laundering, pornography, child trafficking, drug trafficking, arms and ammunition trafficking, where professionals could also be hired and contracted for generating flood infringement and ransomware infringement.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128805995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
My Health Record and Emerging Cybersecurity Challenges in the Australian Digital Environment 我的健康记录和澳大利亚数字环境中出现的网络安全挑战
Handbook of Research on Advancing Cybersecurity for Digital Transformation Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-6975-7.ch005
Anita Medhekar
{"title":"My Health Record and Emerging Cybersecurity Challenges in the Australian Digital Environment","authors":"Anita Medhekar","doi":"10.4018/978-1-7998-6975-7.ch005","DOIUrl":"https://doi.org/10.4018/978-1-7998-6975-7.ch005","url":null,"abstract":"The main aim of embracing evolutionary digital e-health technologies such as ‘My Health Records' is to transform and empower the patients to control their health records, access, choose the right healthcare provider and suitable treatment, when required. It has been a challenge for the healthcare practitioners, hospital staff, as well as patients to accept, embrace, and adopt transformative digital e-health technologies and manage their healthcare records amidst concerns of slow adoption by the patient due to data privacy and cybersecurity issues. Australia, since COVID-19, has stressed the importance of secure online connectivity for the government, business, and the consumers. It is essential that My Health Record platform is cyber-safe, and user-friendly so that consumers feel conformable, safe and secure regarding their personal health records. This chapter discussed the challenges of embracing e-health digital technologies and assurance of advancing cybersecurity of online My Health Record, which will transform e-health provision and empower patients and healthcare providers.","PeriodicalId":382999,"journal":{"name":"Handbook of Research on Advancing Cybersecurity for Digital Transformation","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125619375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信