Limit search to available items
534 results found. Sorted by relevance | date | title .
Book Cover
E-book
Author Katz, Sarah, author

Title Digital earth : cyber threats, privacy and ethics in an age of paranoia / Sarah Katz
Published Cambridge, United Kingdom : IT Governance Publishing, 2022

Copies

Description 1 online resource (108 pages)
Contents Cover -- Title -- Copyright -- About the author -- Acknowledgements -- Contents -- Introduction -- Chapter one: The spike in phishing amid the COVID-19 pandemic -- Key terms for this chapter -- Chaos theory in cyber threat mitigation -- The application of chaos theory to the assessment of phishing attacks -- Chapter two: A glance at the history of phishing mitigation practices -- The risk of phishing to federal health care agencies -- Applications of chaos theory in cyber threat mitigation, including phishing attacks -- Machine learning tools for phishing prevention
Persuasive factors used in phishing attacks -- User awareness of email legitimacy verification techniques -- Chapter three: The hard truth -- How little many users understand about identifying malicious emails -- Tackling email headers -- Next steps: Computer- assisted threat detection -- Chapter four: Disinformation versus misinformation in a post-COVID world -- Global information sharing -- Content moderators -- How to spot misinformation -- Managing content moderation: In theory and practice -- Next steps: Head above water in cyberspace
Chapter five: Cyber terrorism and the firepower of social media -- Why convey a message to the masses? -- Making it look alluring -- Using social media to attract and recruit -- Next steps: Keep an eye on that friend request -- Chapter six: Drones -- A search and rescue solution or the all-seeing eye in the sky? -- The technicalities of civilian privacy in UAV criminal investigation -- San Jose as a case study -- Those opposed -- Those in favor -- Calming the public outcry -- Balancing technological surveillance measures with public interest -- Next steps: Securing the wireless target
Recent developments -- Chapter seven: Tying it all together -- Appendix A: Bibliography -- Further reading
Summary An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives
Bibliography Includes bibliographical references
Notes Description based on online resource; title from digital title page (viewed on August 22, 2022)
Subject Computer security.
Computer crimes -- Prevention
Data protection.
Computer Security
COMPUTERS / Security / General.
Computer crimes -- Prevention
Computer security
Data protection
Form Electronic book
ISBN 9781787783607
178778360X