首页 > 最新文献

International Journal of Cyber Warfare and Terrorism最新文献

英文 中文
The Cyber Talent Gap and Cybersecurity Professionalizing 网络人才缺口与网络安全专业化
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/IJHIOT.2018010104
C. Nobles
Two significant issues loom throughout the cybersecurity domain. The first is the shortage of cybersecurity professionals and the second quandary is the lack of minimum entry standards in cybersecurity. Some organizations' cybersecurity operations are suffering due to the cybersecurity talent gap accompanied by the increasing sophistication and number of cyber-attack attempts. The shortage of cyber talent is rampant in private entities as in public agencies, which highlights the resolve for entry standards into cybersecurity to enhance the professionalization. Researchers and practitioners provide countless recommendations for ameliorating the cybersecurity workforce by addressing the professionalization issue. Professional associations are the nexus of cybersecurity and possess the expertise, leadership, and sustenance to spearhead efforts to develop national-level strategies to resolve the talent gap and establish professionalization standards.
网络安全领域有两个重要问题。一是网络安全专业人才短缺,二是网络安全行业缺乏最低准入标准。由于网络安全人才缺口以及网络攻击的复杂性和数量的增加,一些组织的网络安全运营受到了影响。与公共机构一样,私营机构也普遍缺乏网络人才,这凸显了制定网络安全准入标准以增强专业化的决心。研究人员和从业人员通过解决专业化问题,为改善网络安全劳动力提供了无数的建议。专业协会是网络安全的纽带,拥有专业知识、领导力和支持,可以带头制定国家层面的战略,以解决人才缺口和建立专业化标准。
{"title":"The Cyber Talent Gap and Cybersecurity Professionalizing","authors":"C. Nobles","doi":"10.4018/IJHIOT.2018010104","DOIUrl":"https://doi.org/10.4018/IJHIOT.2018010104","url":null,"abstract":"Two significant issues loom throughout the cybersecurity domain. The first is the shortage of cybersecurity professionals and the second quandary is the lack of minimum entry standards in cybersecurity. Some organizations' cybersecurity operations are suffering due to the cybersecurity talent gap accompanied by the increasing sophistication and number of cyber-attack attempts. The shortage of cyber talent is rampant in private entities as in public agencies, which highlights the resolve for entry standards into cybersecurity to enhance the professionalization. Researchers and practitioners provide countless recommendations for ameliorating the cybersecurity workforce by addressing the professionalization issue. Professional associations are the nexus of cybersecurity and possess the expertise, leadership, and sustenance to spearhead efforts to develop national-level strategies to resolve the talent gap and establish professionalization standards.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"29 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80016652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modern Information Technology, Global Risk, and the Challenges of Crime in the Era of Late Modernity 现代信息技术、全球风险和晚期现代性时代的犯罪挑战
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-1859-4.CH002
A. Jegede
The rapidity and efficient use of most communication technologies remain the driver of accelerated developments across the major societies of the world today. This is quite exciting when compared to what existed in the past. However, current happenings indicate that the contribution of these technologies to sporadic development of nations is fraught with recordable socio-economic risks whose effect is unprecedented and affecting the nature of trust required for social continuity in human environment. Consequently, this paper considers the nature of risks and vulnerabilities affecting e-connectivity from a modernist theoretical perspective and contextualized this in the double edged implication affecting the use of the Internet. The first section of this paper is devoted to review on the nature of affinity between the Internet and crime while the final section engages the empirical analysis of secondary data on the consequences of cyber-crime to the global economy.
大多数通信技术的快速和有效使用仍然是当今世界主要社会加速发展的动力。与过去相比,这是相当令人兴奋的。然而,目前的情况表明,这些技术对国家零星发展的贡献充满了可记录的社会经济风险,其影响是前所未有的,并影响到人类环境中社会连续性所需的信任的性质。因此,本文从现代主义的理论角度考虑影响电子连接的风险和漏洞的性质,并将其置于影响互联网使用的双刃剑含义中。本文的第一部分致力于审查互联网与犯罪之间的亲和力的本质,而最后一部分则对网络犯罪对全球经济影响的二手数据进行实证分析。
{"title":"Modern Information Technology, Global Risk, and the Challenges of Crime in the Era of Late Modernity","authors":"A. Jegede","doi":"10.4018/978-1-5225-1859-4.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-1859-4.CH002","url":null,"abstract":"The rapidity and efficient use of most communication technologies remain the driver of accelerated developments across the major societies of the world today. This is quite exciting when compared to what existed in the past. However, current happenings indicate that the contribution of these technologies to sporadic development of nations is fraught with recordable socio-economic risks whose effect is unprecedented and affecting the nature of trust required for social continuity in human environment. Consequently, this paper considers the nature of risks and vulnerabilities affecting e-connectivity from a modernist theoretical perspective and contextualized this in the double edged implication affecting the use of the Internet. The first section of this paper is devoted to review on the nature of affinity between the Internet and crime while the final section engages the empirical analysis of secondary data on the consequences of cyber-crime to the global economy.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"5 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89287875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Region of Association and Turbulence 联合与湍流的区域
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0582-2.CH001
M. Pant
The areas in and around India have always had a close association in building up of events which with time have attained historical and cultural prominence. In this study of cultural association the today's neighboring countries of Pakistan and Afghanistan have served as a passage of the influx of various cultures into the Indian subcontinent. The end of the Cold War highlighted the new threats which had emerged, not bound in the notions of safeguarding the integrity and sovereignty; they were way beyond territorial demarcations. These new threats were transnational in form with a much larger impact on the masses of the state. The rise and fall of Taliban in Afghanistan and the Anti India Islamic forces in Pakistan with the rise of India as a new regional power has led to new perspectives in concerns for the diplomatic and bilateral relations between these countries. What remains to be pointed is the level of porosity of borders and the ancient passes which have been routes for trade and inter cultural affiliations among these countries. The period of 2009-2015 was marked by various incidents which rocked the subcontinent bringing in strategic concerns to a new level. This article would study the historical linkages and cultural affiliations which binds the area of Afghanistan, Pakistan and India into a deeper relationship. Along with dwelling into the political scenario defined by bilateral and diplomatic ties which has taken up an important place in the times of changing perspectives of war and conflict.
随着时间的推移,印度境内和周边地区一直在建立事件方面有着密切的联系,这些事件已取得了历史和文化上的突出地位。在对文化联系的研究中,今天的邻国巴基斯坦和阿富汗充当了各种文化涌入印度次大陆的通道。冷战的结束突出了已经出现的新的威胁,这些威胁并不局限于维护完整和主权的概念;它们远远超出了领土界限。这些新的威胁在形式上是跨国的,对国家群众的影响要大得多。随着印度作为一个新的地区大国的崛起,阿富汗塔利班和巴基斯坦反印伊斯兰势力的兴衰,为两国之间的外交和双边关系带来了新的视角。仍然需要指出的是边界的疏松程度和作为这些国家之间贸易和文化间联系路线的古代通道。2009年至2015年期间发生了各种事件,这些事件震动了次大陆,将战略关注提升到了一个新的水平。本文将研究使阿富汗、巴基斯坦和印度地区建立更深关系的历史联系和文化联系。同时探讨双边和外交关系所定义的政治情景,这种关系在战争和冲突观点不断变化的时代占据了重要地位。
{"title":"A Region of Association and Turbulence","authors":"M. Pant","doi":"10.4018/978-1-5225-0582-2.CH001","DOIUrl":"https://doi.org/10.4018/978-1-5225-0582-2.CH001","url":null,"abstract":"The areas in and around India have always had a close association in building up of events which with time have attained historical and cultural prominence. In this study of cultural association the today's neighboring countries of Pakistan and Afghanistan have served as a passage of the influx of various cultures into the Indian subcontinent. The end of the Cold War highlighted the new threats which had emerged, not bound in the notions of safeguarding the integrity and sovereignty; they were way beyond territorial demarcations. These new threats were transnational in form with a much larger impact on the masses of the state. The rise and fall of Taliban in Afghanistan and the Anti India Islamic forces in Pakistan with the rise of India as a new regional power has led to new perspectives in concerns for the diplomatic and bilateral relations between these countries. What remains to be pointed is the level of porosity of borders and the ancient passes which have been routes for trade and inter cultural affiliations among these countries. The period of 2009-2015 was marked by various incidents which rocked the subcontinent bringing in strategic concerns to a new level. This article would study the historical linkages and cultural affiliations which binds the area of Afghanistan, Pakistan and India into a deeper relationship. Along with dwelling into the political scenario defined by bilateral and diplomatic ties which has taken up an important place in the times of changing perspectives of war and conflict.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"75 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90586604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Synchronization Signal Jamming Attacks for Cybersecurity in Cyber-Physical Energy Grid Systems 网络物理能量网格系统网络安全同步信号干扰攻击检测
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-1829-7.CH004
D. Rawat, Brycent Chatfield
The transformation of the traditional power grid into a cyber physical smart energy grid brings significant improvement in terms of reliability, performance, and manageability. Most importantly, existing communication infrastructures such as LTE represent the backbone of smart grid functionality. Consequently, connected smart grids inherit vulnerabilities associated with the networks including denial of service attack by means of synchronization signal jamming. This chapter presents cybersecurity in cyber-physical energy grid systems to mitigate synchronization signal jamming attacks in LTE based smart grid communications.
传统电网向网络物理智能电网的转变,在可靠性、性能和可管理性方面都有了显著提高。最重要的是,现有的通信基础设施,如LTE,代表了智能电网功能的支柱。因此,联网智能电网继承了与网络相关的漏洞,包括通过同步信号干扰进行拒绝服务攻击。本章介绍了网络物理能源网格系统中的网络安全,以减轻基于LTE的智能电网通信中的同步信号干扰攻击。
{"title":"Detecting Synchronization Signal Jamming Attacks for Cybersecurity in Cyber-Physical Energy Grid Systems","authors":"D. Rawat, Brycent Chatfield","doi":"10.4018/978-1-5225-1829-7.CH004","DOIUrl":"https://doi.org/10.4018/978-1-5225-1829-7.CH004","url":null,"abstract":"The transformation of the traditional power grid into a cyber physical smart energy grid brings significant improvement in terms of reliability, performance, and manageability. Most importantly, existing communication infrastructures such as LTE represent the backbone of smart grid functionality. Consequently, connected smart grids inherit vulnerabilities associated with the networks including denial of service attack by means of synchronization signal jamming. This chapter presents cybersecurity in cyber-physical energy grid systems to mitigate synchronization signal jamming attacks in LTE based smart grid communications.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"56 10 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79900194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyberattacks, Cybercrime and Cyberterrorism 网络攻击、网络犯罪和网络恐怖主义
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-4100-4.CH010
S. Srivastava, S. Dube
This chapter describes how with growing reliance of modern society over internet and web-based services in every nook and corner of our daily lives, the threats of disruption and damage to these services has also evolved at a parallel rate. One of these threats having a potential of severe and life-threatening devastations is ‘Cyberterrorism.' Contrasting to non-lethal terms such as ‘internet vandalism' and ‘hacktivism,' cyberterrorism encompasses a daunting reach to destruction to the fabric of our modern society. Because of its nature, despite its rapid growth, contrary to conventional terror attacks, cyberterrorism still seems distant from creating a direct threat to civilian life and society. Due to this distance, there is a lack of attention and focus on counter mechanisms against cyberterrorism. By applying effective techniques and keeping our eyes open, establishments can go a long way to avert cyberterror attacks and also recover quickly in the occurrence of an attack. The conclusion of this chapter is that additional research is needed to identify the areas in which personal and professional functions on the internet are still vulnerable.
本章描述了随着现代社会对互联网和基于网络的服务的日益依赖,这些服务的中断和破坏的威胁也在以平行的速度发展。“网络恐怖主义”是其中一种可能造成严重和危及生命的破坏的威胁。与“网络破坏主义”和“黑客行动主义”等非致命性术语相比,网络恐怖主义对我们现代社会结构的破坏程度令人生畏。由于其性质,尽管其发展迅速,但与传统的恐怖袭击不同,网络恐怖主义似乎距离对平民生活和社会造成直接威胁还很遥远。由于这一距离,对打击网络恐怖主义的机制缺乏关注和重视。通过应用有效的技术并保持警惕,企业可以在很大程度上避免网络恐怖袭击,并在发生袭击时迅速恢复。本章的结论是,需要进一步的研究来确定互联网上个人和专业功能仍然脆弱的领域。
{"title":"Cyberattacks, Cybercrime and Cyberterrorism","authors":"S. Srivastava, S. Dube","doi":"10.4018/978-1-5225-4100-4.CH010","DOIUrl":"https://doi.org/10.4018/978-1-5225-4100-4.CH010","url":null,"abstract":"This chapter describes how with growing reliance of modern society over internet and web-based services in every nook and corner of our daily lives, the threats of disruption and damage to these services has also evolved at a parallel rate. One of these threats having a potential of severe and life-threatening devastations is ‘Cyberterrorism.' Contrasting to non-lethal terms such as ‘internet vandalism' and ‘hacktivism,' cyberterrorism encompasses a daunting reach to destruction to the fabric of our modern society. Because of its nature, despite its rapid growth, contrary to conventional terror attacks, cyberterrorism still seems distant from creating a direct threat to civilian life and society. Due to this distance, there is a lack of attention and focus on counter mechanisms against cyberterrorism. By applying effective techniques and keeping our eyes open, establishments can go a long way to avert cyberterror attacks and also recover quickly in the occurrence of an attack. The conclusion of this chapter is that additional research is needed to identify the areas in which personal and professional functions on the internet are still vulnerable.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"11 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73664585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cyber-Physical Systems in Vehicular Communications 车载通信中的信息物理系统
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0773-4.CH015
A. Mehmood, Syed Hassan Ahmed, M. Sarkar
Like the other emerging technologies such as computer evolution and embedded machines, the Vehicular Ad Hoc Networks (VANETs) have also gained much attention from various manufactures and academia. Moreover, we have several on board sensors installed inside the vehicles, responsible for sensing different activities within the vehicle and surrounding such as temperature, intruder detection and so on. Recently, those sensors/actuator systems became responsive to the physical world by enabling real time control emanating from conventional embedded systems, thus emerging a new research paradigm named Cyber-Physical System (CPS). Likewise, other applications for CPS, we have Vehicular Cyber-Physical System (VCPS) that is not a new concept. For now, VCPS may refer to a wide range of transportation management system that is integrated strongly and should be highly accurate, real-time, and efficient. This chapter provides readers with the details of the term “VCPS” followed by the historical overview of this new emerging field including research challenges and future aspects of the VCPS.
与计算机进化和嵌入式机器等其他新兴技术一样,车载自组织网络(VANETs)也受到了各制造商和学术界的广泛关注。此外,我们在车内安装了几个车载传感器,负责感知车内和周围的不同活动,如温度、入侵者检测等。最近,这些传感器/执行器系统通过实现传统嵌入式系统发出的实时控制来响应物理世界,从而出现了一种新的研究范式,称为信息物理系统(CPS)。同样,CPS的其他应用,我们有车辆网络物理系统(VCPS),这不是一个新概念。目前,VCPS可能指的是广泛的运输管理系统,它是一个高度集成的系统,应该是高度准确、实时和高效的。本章为读者提供了术语“VCPS”的详细信息,随后是这个新兴领域的历史概述,包括VCPS的研究挑战和未来方面。
{"title":"Cyber-Physical Systems in Vehicular Communications","authors":"A. Mehmood, Syed Hassan Ahmed, M. Sarkar","doi":"10.4018/978-1-5225-0773-4.CH015","DOIUrl":"https://doi.org/10.4018/978-1-5225-0773-4.CH015","url":null,"abstract":"Like the other emerging technologies such as computer evolution and embedded machines, the Vehicular Ad Hoc Networks (VANETs) have also gained much attention from various manufactures and academia. Moreover, we have several on board sensors installed inside the vehicles, responsible for sensing different activities within the vehicle and surrounding such as temperature, intruder detection and so on. Recently, those sensors/actuator systems became responsive to the physical world by enabling real time control emanating from conventional embedded systems, thus emerging a new research paradigm named Cyber-Physical System (CPS). Likewise, other applications for CPS, we have Vehicular Cyber-Physical System (VCPS) that is not a new concept. For now, VCPS may refer to a wide range of transportation management system that is integrated strongly and should be highly accurate, real-time, and efficient. This chapter provides readers with the details of the term “VCPS” followed by the historical overview of this new emerging field including research challenges and future aspects of the VCPS.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"30 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82342013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Tourism, Terrorism, Morality, and Marketing 旅游、恐怖主义、道德和市场营销
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch073
P. Tarlow
A short time after the January 2015 Paris attacks, the city was quiet, perhaps too quiet. Associated press reporters noted that the tourists have simply gone. In a mid –January news article by Thomas Adamson perhaps summed up the situation best when it stated: “Among the tourists who were still braving visits, many took comfort in the extra security presences. With 10,000 troops deployed across the country including 6,000 in the Paris region alone, the security operation put in motion after the attacks is the most extensive in French soil in recent history The (Bryan Texas) Eagle, page A-3, January 19, 2015). The dearth of tourists however was short lived, as the French were able to assure the world that they had taken full control of the situation, employed some ten thousand troops to sensitive locales, and have given the impression that the terrorist attacks were an anomaly. The terrorism attacks in many parts of Europe remind us that terrorism is as much about purposeful negative marketing as it is about death and destruction.
2015年1月巴黎袭击事件发生后不久,这座城市很安静,也许太安静了。美联社记者指出,游客已经离开。托马斯·亚当森(Thomas Adamson)在1月中旬的一篇新闻文章中或许最好地总结了这种情况,他写道:“在仍然勇敢地参观的游客中,许多人对额外的安全存在感到欣慰。”恐怖袭击发生后,法国在全国部署了1万名士兵,其中仅巴黎地区就部署了6000名士兵,这是近年来法国国土上最大规模的安全行动。(《老鹰报》2015年1月19日第A-3页)然而,游客的匮乏是短暂的,因为法国人能够向世界保证,他们已经完全控制了局势,向敏感地区派遣了大约一万名士兵,并给人留下了恐怖袭击是一种反常现象的印象。在欧洲许多地区发生的恐怖主义袭击提醒我们,恐怖主义既涉及死亡和破坏,也涉及有目的的负面营销。
{"title":"Tourism, Terrorism, Morality, and Marketing","authors":"P. Tarlow","doi":"10.4018/978-1-7998-2466-4.ch073","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch073","url":null,"abstract":"A short time after the January 2015 Paris attacks, the city was quiet, perhaps too quiet. Associated press reporters noted that the tourists have simply gone. In a mid –January news article by Thomas Adamson perhaps summed up the situation best when it stated: “Among the tourists who were still braving visits, many took comfort in the extra security presences. With 10,000 troops deployed across the country including 6,000 in the Paris region alone, the security operation put in motion after the attacks is the most extensive in French soil in recent history The (Bryan Texas) Eagle, page A-3, January 19, 2015). The dearth of tourists however was short lived, as the French were able to assure the world that they had taken full control of the situation, employed some ten thousand troops to sensitive locales, and have given the impression that the terrorist attacks were an anomaly. The terrorism attacks in many parts of Europe remind us that terrorism is as much about purposeful negative marketing as it is about death and destruction.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"33 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75197102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of Honeypots 蜜罐的评估
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch068
B. Gupta, Alisha Gupta
Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is trapped. It is a defensive technique which lures the attacker into performing some illicit operations on it and subsequently using it to trace the activities of attacker, generating signatures and protecting the real system. In this article, a recent survey on Honeypots is presented, its deployment in smartphone scenarios, its usage to curb Distributed Denial of Service attacks in variegated frameworks including Cloud environments, copious datasets and open source. Also described are the types Honeypots available, their various security problems, and existing solutions. Furthermore, there is light shed on disparate issues and the challenges in the existing solutions and scope of further research.
蜜罐对攻击者来说是一个容易的目标,但它实际上是一个“诱饵”,攻击者被困在其中。它是一种防御技术,引诱攻击者对其进行一些非法操作,然后利用它来跟踪攻击者的活动,生成签名,保护真实的系统。在这篇文章中,介绍了最近对honeypot的调查,它在智能手机场景中的部署,它在各种框架(包括云环境、丰富的数据集和开源)中遏制分布式拒绝服务攻击的使用。还介绍了可用的蜜罐类型、它们的各种安全问题以及现有的解决方案。此外,对不同的问题和现有解决方案中的挑战以及进一步研究的范围进行了阐述。
{"title":"Assessment of Honeypots","authors":"B. Gupta, Alisha Gupta","doi":"10.4018/978-1-7998-2466-4.ch068","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch068","url":null,"abstract":"Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is trapped. It is a defensive technique which lures the attacker into performing some illicit operations on it and subsequently using it to trace the activities of attacker, generating signatures and protecting the real system. In this article, a recent survey on Honeypots is presented, its deployment in smartphone scenarios, its usage to curb Distributed Denial of Service attacks in variegated frameworks including Cloud environments, copious datasets and open source. Also described are the types Honeypots available, their various security problems, and existing solutions. Furthermore, there is light shed on disparate issues and the challenges in the existing solutions and scope of further research.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"30 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90975688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Introduction to Tourism Security 旅游保安概论
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch002
M. Korstanje
The present essay review explores the problem of terrorism and security in tourism fields. Certainly, plans and policies provided by guide-books are not being followed in disaster-contests simply chaos and disorder are the nature of emergencies. Beyond any protocol, crises and security are not properly defined by scholars. In this essay-review, we will not pay attention to define what tourism security means, lest by the lens of three senior scholars, Sevil Somnez, Abraham Pizam and Peter Tarlow, who have accomplished this task. They have explored not only the roots of terrorism but security over 20 years. Despite the criticism, they deserve recognition for this legacy. Based on substantial point of divergence, these specialists are concerned by the financial dependency of societies respecting to mass-media and its coverage of terrorist attacks.
本文综述了旅游领域的恐怖主义与安全问题。当然,指南书提供的计划和政策并没有在灾难竞赛中被遵循——混乱和无序是紧急情况的本质。在任何协议之外,学者都没有对危机和安全进行适当的定义。在这篇文章评论中,我们不会注意定义什么是旅游安全,以免通过三位资深学者,塞维尔·索姆内斯,亚伯拉罕·皮萨姆和彼得·塔洛的视角,他们已经完成了这项任务。20年来,他们不仅探讨了恐怖主义的根源,还探讨了安全问题。尽管受到批评,但他们的遗产值得认可。基于实质性的分歧,这些专家对社会对大众传播媒介及其对恐怖袭击的报道的财政依赖感到关切。
{"title":"Introduction to Tourism Security","authors":"M. Korstanje","doi":"10.4018/978-1-7998-2466-4.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch002","url":null,"abstract":"The present essay review explores the problem of terrorism and security in tourism fields. Certainly, plans and policies provided by guide-books are not being followed in disaster-contests simply chaos and disorder are the nature of emergencies. Beyond any protocol, crises and security are not properly defined by scholars. In this essay-review, we will not pay attention to define what tourism security means, lest by the lens of three senior scholars, Sevil Somnez, Abraham Pizam and Peter Tarlow, who have accomplished this task. They have explored not only the roots of terrorism but security over 20 years. Despite the criticism, they deserve recognition for this legacy. Based on substantial point of divergence, these specialists are concerned by the financial dependency of societies respecting to mass-media and its coverage of terrorist attacks.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"37 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84500337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Russian Active Measures and September 11, 2001 俄罗斯的积极措施与2001年9月11日
IF 0.5 Q4 POLITICAL SCIENCE Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2466-4.ch061
M. Hotchkiss
The Cold-War era English-language promoters of Nostradamus (Orson Welles and Erika Cheetham) had strong Leftist-Marxist connections including ties to the Cambridge 5 spy ring. Nostradamus was the top search anomaly of Sept 11, 2001. Interest was driven by a surge in emails and text messages via the internet. This behavior is discussed in relation to known cyber threats from 2001. Similar spikes in Nostradamus searches (Google Trends) emanated from Poland (April 2010), Ukraine (March 2014), and in Hungary (August 2015). Nostradamus mirrors proven Russian disinformation operations, such as those that today implicate 9/11 as being an “inside job” by the US government, or that the CIA killed JFK, or that the CIA engineered the AIDS virus. Noting the use of Nostradamus by both the Allies and the Axis powers as a psychological warfare tool in World War 2, the case is made that it was the Russians carrying out an “information attack” on 9/11 that is consistent with Russian cyber warfare and active measures strategy and that they may have used similar techniques elsewhere since 2001.
冷战时期《诺查丹玛斯》的英语传播者(奥森·威尔斯和埃里卡·奇塔姆)与左翼马克思主义有着密切的联系,包括与剑桥5间谍网的联系。诺查丹玛斯是2001年9月11日搜索最多的异常。通过互联网发送的电子邮件和短信的激增推动了人们的兴趣。这种行为与2001年已知的网络威胁有关。波兰(2010年4月)、乌克兰(2014年3月)和匈牙利(2015年8月)也出现了类似的诺查丹玛斯搜索高峰(谷歌趋势)。《诺查丹玛斯》反映了俄罗斯已被证实的虚假信息操作,比如今天那些暗示9/11是美国政府的“内部工作”,或者CIA杀死了肯尼迪,或者CIA设计了艾滋病病毒的操作。
{"title":"Russian Active Measures and September 11, 2001","authors":"M. Hotchkiss","doi":"10.4018/978-1-7998-2466-4.ch061","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch061","url":null,"abstract":"The Cold-War era English-language promoters of Nostradamus (Orson Welles and Erika Cheetham) had strong Leftist-Marxist connections including ties to the Cambridge 5 spy ring. Nostradamus was the top search anomaly of Sept 11, 2001. Interest was driven by a surge in emails and text messages via the internet. This behavior is discussed in relation to known cyber threats from 2001. Similar spikes in Nostradamus searches (Google Trends) emanated from Poland (April 2010), Ukraine (March 2014), and in Hungary (August 2015). Nostradamus mirrors proven Russian disinformation operations, such as those that today implicate 9/11 as being an “inside job” by the US government, or that the CIA killed JFK, or that the CIA engineered the AIDS virus. Noting the use of Nostradamus by both the Allies and the Axis powers as a psychological warfare tool in World War 2, the case is made that it was the Russians carrying out an “information attack” on 9/11 that is consistent with Russian cyber warfare and active measures strategy and that they may have used similar techniques elsewhere since 2001.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"48 2 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84924166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Cyber Warfare and Terrorism
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1