International Journal of Cyber Warfare and Terrorism最新文献

筛选
英文 中文
The Cyber Talent Gap and Cybersecurity Professionalizing 网络人才缺口与网络安全专业化
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/IJHIOT.2018010104
C. Nobles
{"title":"The Cyber Talent Gap and Cybersecurity Professionalizing","authors":"C. Nobles","doi":"10.4018/IJHIOT.2018010104","DOIUrl":"https://doi.org/10.4018/IJHIOT.2018010104","url":null,"abstract":"Two significant issues loom throughout the cybersecurity domain. The first is the shortage of cybersecurity professionals and the second quandary is the lack of minimum entry standards in cybersecurity. Some organizations' cybersecurity operations are suffering due to the cybersecurity talent gap accompanied by the increasing sophistication and number of cyber-attack attempts. The shortage of cyber talent is rampant in private entities as in public agencies, which highlights the resolve for entry standards into cybersecurity to enhance the professionalization. Researchers and practitioners provide countless recommendations for ameliorating the cybersecurity workforce by addressing the professionalization issue. Professional associations are the nexus of cybersecurity and possess the expertise, leadership, and sustenance to spearhead efforts to develop national-level strategies to resolve the talent gap and establish professionalization standards.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"29 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80016652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modern Information Technology, Global Risk, and the Challenges of Crime in the Era of Late Modernity 现代信息技术、全球风险和晚期现代性时代的犯罪挑战
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-1859-4.CH002
A. Jegede
{"title":"Modern Information Technology, Global Risk, and the Challenges of Crime in the Era of Late Modernity","authors":"A. Jegede","doi":"10.4018/978-1-5225-1859-4.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-1859-4.CH002","url":null,"abstract":"The rapidity and efficient use of most communication technologies remain the driver of accelerated developments across the major societies of the world today. This is quite exciting when compared to what existed in the past. However, current happenings indicate that the contribution of these technologies to sporadic development of nations is fraught with recordable socio-economic risks whose effect is unprecedented and affecting the nature of trust required for social continuity in human environment. Consequently, this paper considers the nature of risks and vulnerabilities affecting e-connectivity from a modernist theoretical perspective and contextualized this in the double edged implication affecting the use of the Internet. The first section of this paper is devoted to review on the nature of affinity between the Internet and crime while the final section engages the empirical analysis of secondary data on the consequences of cyber-crime to the global economy.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"5 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89287875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Region of Association and Turbulence 联合与湍流的区域
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0582-2.CH001
M. Pant
{"title":"A Region of Association and Turbulence","authors":"M. Pant","doi":"10.4018/978-1-5225-0582-2.CH001","DOIUrl":"https://doi.org/10.4018/978-1-5225-0582-2.CH001","url":null,"abstract":"The areas in and around India have always had a close association in building up of events which with time have attained historical and cultural prominence. In this study of cultural association the today's neighboring countries of Pakistan and Afghanistan have served as a passage of the influx of various cultures into the Indian subcontinent. The end of the Cold War highlighted the new threats which had emerged, not bound in the notions of safeguarding the integrity and sovereignty; they were way beyond territorial demarcations. These new threats were transnational in form with a much larger impact on the masses of the state. The rise and fall of Taliban in Afghanistan and the Anti India Islamic forces in Pakistan with the rise of India as a new regional power has led to new perspectives in concerns for the diplomatic and bilateral relations between these countries. What remains to be pointed is the level of porosity of borders and the ancient passes which have been routes for trade and inter cultural affiliations among these countries. The period of 2009-2015 was marked by various incidents which rocked the subcontinent bringing in strategic concerns to a new level. This article would study the historical linkages and cultural affiliations which binds the area of Afghanistan, Pakistan and India into a deeper relationship. Along with dwelling into the political scenario defined by bilateral and diplomatic ties which has taken up an important place in the times of changing perspectives of war and conflict.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"75 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90586604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Synchronization Signal Jamming Attacks for Cybersecurity in Cyber-Physical Energy Grid Systems 网络物理能量网格系统网络安全同步信号干扰攻击检测
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-1829-7.CH004
D. Rawat, Brycent Chatfield
{"title":"Detecting Synchronization Signal Jamming Attacks for Cybersecurity in Cyber-Physical Energy Grid Systems","authors":"D. Rawat, Brycent Chatfield","doi":"10.4018/978-1-5225-1829-7.CH004","DOIUrl":"https://doi.org/10.4018/978-1-5225-1829-7.CH004","url":null,"abstract":"The transformation of the traditional power grid into a cyber physical smart energy grid brings significant improvement in terms of reliability, performance, and manageability. Most importantly, existing communication infrastructures such as LTE represent the backbone of smart grid functionality. Consequently, connected smart grids inherit vulnerabilities associated with the networks including denial of service attack by means of synchronization signal jamming. This chapter presents cybersecurity in cyber-physical energy grid systems to mitigate synchronization signal jamming attacks in LTE based smart grid communications.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"56 10 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79900194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyberattacks, Cybercrime and Cyberterrorism 网络攻击、网络犯罪和网络恐怖主义
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-4100-4.CH010
S. Srivastava, S. Dube
{"title":"Cyberattacks, Cybercrime and Cyberterrorism","authors":"S. Srivastava, S. Dube","doi":"10.4018/978-1-5225-4100-4.CH010","DOIUrl":"https://doi.org/10.4018/978-1-5225-4100-4.CH010","url":null,"abstract":"This chapter describes how with growing reliance of modern society over internet and web-based services in every nook and corner of our daily lives, the threats of disruption and damage to these services has also evolved at a parallel rate. One of these threats having a potential of severe and life-threatening devastations is ‘Cyberterrorism.' Contrasting to non-lethal terms such as ‘internet vandalism' and ‘hacktivism,' cyberterrorism encompasses a daunting reach to destruction to the fabric of our modern society. Because of its nature, despite its rapid growth, contrary to conventional terror attacks, cyberterrorism still seems distant from creating a direct threat to civilian life and society. Due to this distance, there is a lack of attention and focus on counter mechanisms against cyberterrorism. By applying effective techniques and keeping our eyes open, establishments can go a long way to avert cyberterror attacks and also recover quickly in the occurrence of an attack. The conclusion of this chapter is that additional research is needed to identify the areas in which personal and professional functions on the internet are still vulnerable.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"11 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73664585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cyber-Physical Systems in Vehicular Communications 车载通信中的信息物理系统
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0773-4.CH015
A. Mehmood, Syed Hassan Ahmed, M. Sarkar
{"title":"Cyber-Physical Systems in Vehicular Communications","authors":"A. Mehmood, Syed Hassan Ahmed, M. Sarkar","doi":"10.4018/978-1-5225-0773-4.CH015","DOIUrl":"https://doi.org/10.4018/978-1-5225-0773-4.CH015","url":null,"abstract":"Like the other emerging technologies such as computer evolution and embedded machines, the Vehicular Ad Hoc Networks (VANETs) have also gained much attention from various manufactures and academia. Moreover, we have several on board sensors installed inside the vehicles, responsible for sensing different activities within the vehicle and surrounding such as temperature, intruder detection and so on. Recently, those sensors/actuator systems became responsive to the physical world by enabling real time control emanating from conventional embedded systems, thus emerging a new research paradigm named Cyber-Physical System (CPS). Likewise, other applications for CPS, we have Vehicular Cyber-Physical System (VCPS) that is not a new concept. For now, VCPS may refer to a wide range of transportation management system that is integrated strongly and should be highly accurate, real-time, and efficient. This chapter provides readers with the details of the term “VCPS” followed by the historical overview of this new emerging field including research challenges and future aspects of the VCPS.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"30 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82342013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Tourism, Terrorism, Morality, and Marketing 旅游、恐怖主义、道德和市场营销
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch073
P. Tarlow
{"title":"Tourism, Terrorism, Morality, and Marketing","authors":"P. Tarlow","doi":"10.4018/978-1-7998-2466-4.ch073","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch073","url":null,"abstract":"A short time after the January 2015 Paris attacks, the city was quiet, perhaps too quiet. Associated press reporters noted that the tourists have simply gone. In a mid –January news article by Thomas Adamson perhaps summed up the situation best when it stated: “Among the tourists who were still braving visits, many took comfort in the extra security presences. With 10,000 troops deployed across the country including 6,000 in the Paris region alone, the security operation put in motion after the attacks is the most extensive in French soil in recent history The (Bryan Texas) Eagle, page A-3, January 19, 2015). The dearth of tourists however was short lived, as the French were able to assure the world that they had taken full control of the situation, employed some ten thousand troops to sensitive locales, and have given the impression that the terrorist attacks were an anomaly. The terrorism attacks in many parts of Europe remind us that terrorism is as much about purposeful negative marketing as it is about death and destruction.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"33 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75197102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of Honeypots 蜜罐的评估
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch068
B. Gupta, Alisha Gupta
{"title":"Assessment of Honeypots","authors":"B. Gupta, Alisha Gupta","doi":"10.4018/978-1-7998-2466-4.ch068","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch068","url":null,"abstract":"Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is trapped. It is a defensive technique which lures the attacker into performing some illicit operations on it and subsequently using it to trace the activities of attacker, generating signatures and protecting the real system. In this article, a recent survey on Honeypots is presented, its deployment in smartphone scenarios, its usage to curb Distributed Denial of Service attacks in variegated frameworks including Cloud environments, copious datasets and open source. Also described are the types Honeypots available, their various security problems, and existing solutions. Furthermore, there is light shed on disparate issues and the challenges in the existing solutions and scope of further research.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"30 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90975688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Introduction to Tourism Security 旅游保安概论
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch002
M. Korstanje
{"title":"Introduction to Tourism Security","authors":"M. Korstanje","doi":"10.4018/978-1-7998-2466-4.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch002","url":null,"abstract":"The present essay review explores the problem of terrorism and security in tourism fields. Certainly, plans and policies provided by guide-books are not being followed in disaster-contests simply chaos and disorder are the nature of emergencies. Beyond any protocol, crises and security are not properly defined by scholars. In this essay-review, we will not pay attention to define what tourism security means, lest by the lens of three senior scholars, Sevil Somnez, Abraham Pizam and Peter Tarlow, who have accomplished this task. They have explored not only the roots of terrorism but security over 20 years. Despite the criticism, they deserve recognition for this legacy. Based on substantial point of divergence, these specialists are concerned by the financial dependency of societies respecting to mass-media and its coverage of terrorist attacks.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"37 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84500337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Russian Active Measures and September 11, 2001 俄罗斯的积极措施与2001年9月11日
IF 0.5
International Journal of Cyber Warfare and Terrorism Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch061
M. Hotchkiss
{"title":"Russian Active Measures and September 11, 2001","authors":"M. Hotchkiss","doi":"10.4018/978-1-7998-2466-4.ch061","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch061","url":null,"abstract":"The Cold-War era English-language promoters of Nostradamus (Orson Welles and Erika Cheetham) had strong Leftist-Marxist connections including ties to the Cambridge 5 spy ring. Nostradamus was the top search anomaly of Sept 11, 2001. Interest was driven by a surge in emails and text messages via the internet. This behavior is discussed in relation to known cyber threats from 2001. Similar spikes in Nostradamus searches (Google Trends) emanated from Poland (April 2010), Ukraine (March 2014), and in Hungary (August 2015). Nostradamus mirrors proven Russian disinformation operations, such as those that today implicate 9/11 as being an “inside job” by the US government, or that the CIA killed JFK, or that the CIA engineered the AIDS virus. Noting the use of Nostradamus by both the Allies and the Axis powers as a psychological warfare tool in World War 2, the case is made that it was the Russians carrying out an “information attack” on 9/11 that is consistent with Russian cyber warfare and active measures strategy and that they may have used similar techniques elsewhere since 2001.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"48 2 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84924166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信