Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues
نویسنده
چکیده
..................................................................................................................ix Part I: Technical Challenges in Tracking and Tracing Cyber-Attacks ..................1
منابع مشابه
How Can We Deter Cyber Terrorism?
Jian Hua1 and Sanjay Bapna2 1School of Business and Public Administration, University of the District of Columbia, Washington, D.C., USA 2Morgan State University, Baltimore, Maryland, USA ABSTRACT In order to deter cyber terrorism, it is important to identify the terrorists, since punishment may not deter them. The identification probability relies heavily on tracking cyber terrorists. However,...
متن کاملAnalysis of Cybercrime and Cyber Attacks during the COVID-19 Pandemic
The COVID-19 pandemic was a remarkable and unprecedented event that changed the lives of billions of citizens around the world and resulted in what is known as a new term in terms of social norms and lifestyles. In addition to the tremendous impact on society and business in general, the epidemic created a unique set of cybercrime circumstances that also affected society and business. Increased...
متن کاملCyber Risk Exposure and Prospects for Cyber Insurance
This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...
متن کاملIEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...
متن کاملA New Gilded Age, and What It Means for Global Health; Comment on “Global Health Governance Challenges 2016 – Are We Ready?”
New contours of global inequality present new challenges for global health, and require that we consider new kinds of health issues as global. I provide a number of illustrations, arguing the need for a political science of health that goes beyond conventional preoccupations with formal institutional and interstate interactions and takes into account how globalization has affected the health po...
متن کامل