O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cybersecurity Breaches and Issues Surrounding Online Threat Protection

Book Description

Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or system errors, among other online threats. Cybersecurity Breaches and Issues Surrounding Online Threat Protection is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. List of Reviewers
    1. List of Reviewers
  6. Preface
    1. THE CHALLENGES
    2. ORGANIZATION OF THE BOOK
    3. REFERENCES
  7. Acknowledgment
  8. Section 1: Identifying Cybersecurity and Its Threats
    1. Chapter 1: An Exploration Regarding Issues in Insider Threat
      1. ABSTRACT
      2. INTRODUCTION
      3. UNDERSTANDING AN INSIDER AND TYPES OF INSIDERS
      4. FORMS OF INSIDER THREATS: TYPES OF MISUSE
      5. CASE STUDIES: EXAMPLES OF INSIDER THREAT
      6. WHY AN INSIDER BECOMES A THREAT: THE CONTRIBUTING FACTORS
      7. INSIDER THREAT SITUATION OUTSIDE THE UNITED STATES
      8. IDENTIFYING POTENTIAL INSIDERS: THE USUAL SUSPECTS
      9. PREVENTION OF INSIDER THREAT
      10. RELATED RESEARCH
      11. CONCLUSION
      12. ACKNOWLEDGEMENT
      13. REFERENCES
    2. Chapter 2: The Development of Cybersecurity Policy and Legislative Landscape in Latin America and Caribbean States
      1. ABSTRACT
      2. INTRODUCTION
      3. GROWTH AND INCREASING INTERNATIONAL CONVERGENCE IN CYBERSECURITY STRATEGIES
      4. CYBER SECURITY TRENDS IN THE CARIBBEAN REGION
      5. KEY PLAYERS IN THE CYBERSECURITY LANDSCAPE
      6. CONCLUSION: THE FUTURE FOR CYBER SECURITY IN THE CARIBBEAN
      7. REFERENCES
      8. KEY WORDS AND DEFINITIONS
      9. ENDNOTES
    3. Chapter 3: Internet Pharmacy Cybercrime
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. A CHANGING POLICY CONTEXT
      5. POLICY PLAYERS
      6. INTERNET PHARMACY CYBERCRIME POLICY
      7. DIFFUSION THEORY EXPLAINS POLICY ADOPTION
      8. METHODS: DATA AND MEASUREMENT
      9. FINDINGS AND DISCUSSION
      10. CONCLUSION
      11. REFERENCES
      12. KEY TERMS AND DEFINITIONS
    4. Chapter 4: Identifying and Analyzing the Latent Cyber Threats in Developing Economies
      1. ABSTRACT
      2. INTRODUCTION
      3. REVIEW OF LITERATURE
      4. MAIN FOCUS OF THE CHAPTER
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
  9. Section 2: Cybercrime
    1. Chapter 5: Cybercrime Investigation
      1. ABSTRACT
      2. INTRODUCTION
      3. CYBERCRIME: A TO Z
      4. CYBERCRIME IN REAL WORLD
      5. CASE STUDIES
      6. INVESTIGATING CYBERCRIME
      7. BARRIERS TO CYBERCRIME INVESTIGATIONS
      8. LAW ENFORCEMENT AUTHORITIES
      9. CYBER SECURITY: RESEARCH PERSPECTIVE
      10. CONCLUSION
      11. REFERENCES
      12. ADDITIONAL READING
    2. Chapter 6: Cybercrimes via Virtual Currencies in International Business
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CYBERCRIME
      5. THE EFFECTS OF CYBERCRIME IN ECONOMIES
      6. VIRTUAL CURRENCIES
      7. REGULATIONS OF VIRTUAL CURRENCIES WITHIN THE COUNTRIES
      8. CYBERCRIMES VIA VIRTUAL CURRENCIES
      9. SOLUTIONS AND RECOMMENDATIONS
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
      12. REFERENCES
      13. KEY TERMS AND DEFINITIONS
    3. Chapter 7: Cybersecurity and Data Breaches at Schools
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ISSUES, CONTROVERSIES, PROBLEMS
      5. SOLUTIONS AND RECOMMENDATIONS
      6. NON-TECHNICAL SOLUTIONS
      7. TECHNICAL SOLUTIONS AND THE LIMITATIONS
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    4. Chapter 8: Detection Protocol of Possible Crime Scenes Using Internet of Things (IoT)
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. STATE OF THE ART
      5. ISSUES AND CHALLENGES
      6. POSSIBLE SOURCES OF DIGITAL EVIDENCE
      7. DETECTION PROTOCOL OF POSSIBLE CRIME SCENES IN REAL-TIME USING IoT SENSOR NETWORK VIA DATA CLASSIFICATION
      8. FUTURE WORK
      9. SUMMARY
      10. CONCLUSION
      11. REFERENCES
  10. Section 3: Into the Cloud
    1. Chapter 9: Solutions for Securing End User Data over the Cloud Deployed Applications
      1. ABSTRACT
      2. INTRODUCTION TO END USER COMPUTING
      3. BACKGROUND
      4. END USER APPLICATIONS
      5. END USER CHALLENGES IN CLOUD
      6. SOLUTIONS AND RECOMMENDATIONS: PROPOSED SOLUTIONS FOR RESOLVING CLOUD DATA SECURITY ISSUES
      7. CONCLUSION
      8. REFERENCES
    2. Chapter 10: Cloud Computing and Cybersecurity Issues Facing Local Enterprises
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ISSUES AND PROBLEMS
      5. FURTHER CONSIDERATIONS AND RECOMMENDATIONS
      6. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
      7. REFERENCES
      8. APPENDIX
    3. Chapter 11: SOHO Users' Perceptions of Reliability and Continuity of Cloud-Based Services
      1. ABSTRACT
      2. INTRODUCTION
      3. SOHO BUSINESSES
      4. BACKGROUND
      5. CONTINUITY OF BUSINESS SERVICES USING THE CLOUD
      6. MAIN FOCUS OF THE CHAPTER
      7. SOLUTIONS AND RECOMMENDATIONS
      8. THEORETICAL AND PRACTICAL IMPLICATIONS
      9. FUTURE RESEARCH DIRECTIONS AND LIMITATIONS
      10. CONCLUSION
      11. REFERENCES
      12. KEY TERMS AND DEFINITIONS
    4. Chapter 12: Big Data Security Framework for Distributed Cloud Data Centers
      1. ABSTRACT
      2. INTRODUCTION
      3. OVERVIEW OF BIG DATA SECURITY IN CLOUD COMPUTING
      4. PROPOSED BIG DATA SECURITY ARCHITECTURE IN CLOUD COMPUTING
      5. CONCLUSION
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
    5. Chapter 13: Robotics
      1. ABSTRACT
      2. INTRODUCTION
      3. TRENDS AND ISSUES WITH ROBOTICS IN THE ROBOTIC AGE
      4. FUTURE RESEARCH DIRECTIONS
      5. CONCLUSION
      6. REFERENCES
      7. ADDITIONAL READING
      8. KEY TERMS AND DEFINITIONS
  11. Compilation of References
  12. About the Contributors