You are previewing Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities.
O'Reilly logo
Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities

Book Description

Technology provides numerous opportunities for positive developments in modern society; however, these venues inevitably increase vulnerability to threats in online environments. Addressing issues of security in the cyber realm is increasingly relevant and critical to society. Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests, this book is ideally designed for academics, researchers, graduate students, professionals, and practitioners actively involved in the expanding field of cyber security.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Preface
    1. THE CHALLENGE
    2. THE SEARCH FOR SOLUTION
    3. ORGANIZATION OF THE BOOK
    4. REFERENCES
  6. Section 1: Cyber Security in Global Times
    1. Chapter 1: A Simple Solution to Prevent Parameter Tampering in Web Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MATERIALS AND METHODS
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. ADDITIONAL READING
      10. KEY TERMS AND DEFINITIONS
    2. Chapter 2: Cyber Security Centres for Threat Detection and Mitigation
      1. ABSTRACT
      2. INTRODUCTION
      3. THE NEED FOR MONITORING AND INCIDENT RESPONSE
      4. THE BENEFITS OF MONITORING AND INCIDENT RESPONSE
      5. STRUCTURES TO FACILITATE MONITORING AND THREAT DETECTION: SOCs
      6. AN APPROACH TO BUILDING SOCs
      7. STRUCTURES TO FACILITATE INCIDENT HANDLING: CSIRTs
      8. STRUCTURES TO FACILITATE ADVANCED THREAT DETECTION AND MITIGATION: SICs
      9. GUIDANCE IN TERMS OF CYBER SECURITY THREAT DETECTION AND MITIGATION
      10. CONCLUSION
      11. REFERENCES
      12. KEY TERMS AND DEFINITIONS
    3. Chapter 3: Methods and Tools of Big Data Analysis for Terroristic Behavior Study and Threat Identification
      1. ABSTRACT
      2. INTRODUCTION
      3. METHODOLOGY
      4. DATA AND RESULTS
      5. CONCLUSION AND DISCUSSION
      6. ACKNOWLEDGMENT
      7. REFERENCES
  7. Section 2: The Meaning of Security and Cyber Risk
    1. Chapter 4: Analysis of Cyber-Attacks against the Transportation Sector
      1. ABSTRACT
      2. INTRODUCTION
      3. CYBER-ATTACKS ON THE TRANSPORTATION SECTOR
      4. ANALYSIS OF INCIDENTS
      5. EFFORTS FOR THREAT MITIGATION
      6. CONCLUSION
      7. REFERENCES
      8. KEY TERMS AND DEFINITIONS
    2. Chapter 5: English Speaking Countries and the Culture of Fear
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION
      4. REFERENCES
      5. ADDITIONAL READING
      6. KEY TERMS AND DEFINITIONS
    3. Chapter 6: Trolls Just Want to Have Fun
      1. ABSTRACT
      2. INTRODUCTION
      3. GOVERNANCE, ICTs, AND PUBLIC ENGAGEMENT IN THE EUROPEAN UNION
      4. RESEARCH METHODOLOGY
      5. DIS(CONNECTED) CITIZENSHIP? AN EXPLORATION OF KEY CONCEPTS
      6. THE INTERNET, POLITICS, AND THE PUBLIC: UNDERSTANDING POLITICAL PARTICIPATION ONLINE
      7. REFLECTIONS ON THE INSIDER THREAT: CYBER SECURITY AND THE ARCHITECTURE OF SYSTEMIC CONTROL
      8. TECHNOLOGY- AND INTERNET-BASED ADDICTIONS: KEY DEFINITIONS AND CONCEPTS
      9. TECHNOLOGY ADDICTION DISORDERS, DIGITISED ENVIRONMENTS, AND PUBLIC ENGAGEMENT: CYBER-BULLYING, LURKING, AND TROLLING ONLINE
      10. THE CHANGING FACE OF AGGRESSIVE DISORDERS: FROM THE SCHOOL PLAYGROUND TO THE VIRTUAL SANDPIT
      11. THE PHENOMENON THAT IS ELECTRONIC AGGRESSION: FROM CYBER BULLYING TO ONLINE TROLLING
      12. TROLLING AS ASYCHRONOUS COMPUTER-MEDIATED AGGRESSION: PROFILING TROLLS AND TROLLING BEHAVIOURS
      13. DON’T FEED THE TROLLS!: UNDERSTANDING THE PSYCHOLOGY BEHIND HUMAN-COMPUTER INTERACTIONS
      14. THE TROLLS AMONG US: PRIVACY, TRUST, AND FREEDOM OF EXPRESSION ONLINE
      15. THE MIRROR HAS TWO FACES: e-CONSULTATION AS TWO-WAY PARTICIPATORY GOVERNANCE IN THE DIGITAL AGE?
      16. PUBLIC ADMINISTRATION AND ICT POLICY IN THE UNITED KINGDOM
      17. THE NO.10 DOWNING STREET e-PETITIONS INITIATIVE
      18. RECONFIGURING GOVERNMENT-CITIZEN RELATIONS THROUGH e-PETITIONS
      19. DESIGNING PUBLIC POLICY FOR e-DEMOCRACY IN THE UK
      20. CONCLUSION
      21. REFERENCES
      22. ADDITIONAL READING
      23. KEY TERMS AND DEFINITIONS
      24. ENDNOTES
    4. Chapter 7: The Risk, the Real, and the Impossibility of Life
      1. ABSTRACT
      2. INTRODUCTION
      3. FUTURE GUIDING DIRECTIONS: THE END OF RESILIENCY
      4. CONCLUSION
      5. REFERENCES
      6. ADDITIONAL READING
      7. KEY TERMS AND DEFINITIONS
  8. Section 3: CyberTerrorism and Civil Riots
    1. Chapter 8: OSNs as Cyberterrorist Weapons against the General Public
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION
      4. REFERENCES
    2. Chapter 9: The Fight for Cyber Thoreau
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION
      4. REFERENCES
      5. ADDITIONAL READING
      6. KEY TERMS AND DEFINITIONS
    3. Chapter 10: Twitter Use in Student Protests
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION
      4. REFERENCES
      5. KEY TERMS AND DEFINITIONS
    4. Chapter 11: The Roots of Terror
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION
      4. REFERENCES
      5. ADDITIONAL READING
      6. KEY TERMS AND DEFINITIONS
  9. Compilation of References
  10. About the Contributors