In today’s modernized market, many fields are utilizing internet technologies in their standard methods of operation. Technology advancements have provided numerous innovations that benefit people’s daily lives, including reduced costs, scalability, and efficiency improvements. Despite this, as technology becomes more ubiquitous, corresponding risks also increase. The same public and corporate solutions do not apply to this specific district because these security issues are more complex and intensive. Research is needed that explores new risk assessment methods and security mechanisms that professionals can apply to their modern technological procedures. In recognition of Cybersecurity Awareness Month, we invited cybersecurity experts to discuss the existing situation and challenges and provide their professional expertise to invoke the public’s attention to this field.
| Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention | Sunita Vikrant Dhavale (Defence Institute of Advanced Technology, India)
©2019 | 281 pgs. | EISBN13: 9781522576297 | - Receive 10% Discount on All IGI Global published Book, Chapter, and Article Products through the Online Bookstore
- Suitable for Technical Experts, Students, Academicians, Government Officials, & Industry Professionals
- Covers Topics such as Cyber Operations, Server Security, & Network Statistics
- Excellent Addition to Your Institution's Library
|
| |
|
|
Hear from the Expert, Prof. Sunita V. Dhavale
Sunita Vikrant Dhavale, presently associated with Defence Institute of Advanced Technology (DIAT), an autonomous institute under the Ministry of Defence, Pune, as an Assistant Professor in Department of Computer Engineering. She received her M.E. (Computer Science and Engineering) from the Pune University in 2009 and PhD (Computer Science and Engineering) from DIAT University in 2015. She is EC-Council’s Certified Ethical Hacker (C|EH-v9), 2017. She is recipient of IETE M. N. Saha Memorial Award for her paper published in IETE Journal of Research and Outstanding Woman Achiever Award from Venus International Foundation.
"In current era, many governments are embracing digital transformation with a vision to transform a country into a digitally empowered society and knowledge economy. Using cutting-edge digital technologies, governments are successfully providing various digital services to citizens at local, regional and national levels, ranging from filling income tax returns to renewing a driver's license. However, due to different economic and political motivations, state sponsored cyber criminals have consistently targeted several government institutions around the world over recent years which compromised the data of citizens and government agencies. For example:
These cyber incidents urge the mandatory cyber security awareness, training and education programs for government security professionals to overcome primary challenge to keep their institutions and agencies secure. And frankly speaking, 'government officials cannot protect government information assets if they don’t learn how attackers think or what techniques attackers can use to exploit systems'. Hence, learning offensive security techniques like Ethical Hacking is becoming a need of future cyber security world. For building effective defense posture for our systems and networks in the cyber space, there is a need to create an ethical hacking knowledge base. The ethical hacking subject knowledge content discussed in this book titled
Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention will direct any government professionals through a systematic process while learning and practicing ethical hacking using a virtual environment." —
Prof. Sunita Vikrant Dhavale, (Defence Institute of Advanced Technology, India)
Hear from the Expert, Prof. Kevin Curran
Kevin Curran is a Reader in Computer Science at the University of Ulster and group leader for the Ambient Intelligence Research Group. His achievements include winning and managing UK & European Framework projects and Technology Transfer Schemes. Dr. Curran has made significant contributions to advancing the knowledge and understanding of computer networking and systems, evidenced by over 700 published works. He is perhaps most well-known for his work on location positioning within indoor environments, pervasive computing, and internet security. His expertise has been acknowledged by invitations to present his work at international conferences, overseas universities, and research laboratories. He is a regular contributor to BBC Radio & TV news in the UK and is currently the recipient of an Engineering and Technology Board Visiting Lectureship for Exceptional Engineers and is an IEEE Technical Expert for Internet/Security matters.
"I am pleased that various governments are recognising the importance of cybersecurity in modern life through dedicating a month to it. People often under estimate the importance of cybersecurity awareness until it is too late and they suffer loss and upheaval in their lives. One does not have to have a PhD in computer science to be secure online. Many of the known attacks are low level human manipulation tactics. Preventive methods are quite simply to teach and us in the cybersecurity world should continue to spread best practice in cybersecurity." —the author of Chapter 3 from book,
Cybersecurity Education for Awareness and Compliance, Prof. Kevin Curran, (Ulster University, UK)
| Cybersecurity Education for Awareness and Compliance | Ismini Vasileiou (University of Plymouth, UK) and Steven Furnell (University of Plymouth, UK)
©2019 | 306 pgs. | EISBN13: 9781522578482 | - Receive 10% Discount on All IGI Global published Book, Chapter, and Article Products through the Online Bookstore
- Suitable for IT Consultants and Specialist Staff including Chief Information Security Officers, Managers, Trainers, & Organizations.
- Covers Topics such as Curricula, Curricular Guidelines, Insider Threats, & Cybersecurity Education
- Excellent Addition to Your Institution's Library
|
| |
|
|
Hear from the Expert, Prof. Darrell Norman Burrell
Darrell Norman Burrell is visiting scholar at the Samuel DeWitt Proctor Institute for Leadership, Equity, and Justice at Rutgers University. Dr. Burrell has two doctorate degrees and five graduate degrees. Dr. Burrell received his first doctoral degree in Health Education from A.T. Still University in 2010. In 2021, Dr. Burrell completed his 2nd doctorate, a Doctor of Philosophy (Ph.D.) in Cybersecurity Leadership and Organizational Behavior at Capitol Technology University, Laurel, MD. Prof. Burrell has contributed many chapters and articles to IGI Global publications over the years, including "An Exploration of the Cybersecurity Workforce Shortage," which is featured in the Research Anthology on
Cyber Warfare and Terrorism.
"According to data reports covering the first half of 2022 alone, the healthcare sector suffered about 337 breaches accounting for 19 million records. In 2021, 45 million individuals were affected by healthcare attacks, up from 34 million in 2020. That number has tripled in just three years, growing from 14 million in 2018, according to the report, which analyzes breach data reported to the U.S. Department of Health and Human Services (HHS) by healthcare organizations. The healthcare sector stands out for extremely high breach costs on the global average chart. Furthermore, the industry has kept its leading position in that respect for the 12th year in a row, setting a new record of $10.10 million in average breach costs after rising nearly $1 million from the previous year. Here are some stats to consider in comparison:
- The global average of breaches across all sectors was $4.32 million
- The average ransomware attack costs organizations $4.54 million
- The average critical infrastructure attack came in at $4.82 million
These incidents point to significant and complex cybersecurity risks for all healthcare organizations. Effectively managing these risks requires healthcare managers to develop system thinking and adaptive leadership skills and recruit professionals and researchers from various backgrounds. Providing researchers with the latest cybersecurity research has never been more critical. Developing researchers and training professionals for cybersecurity careers has never been more important."
—
Prof. Darrell Norman Burrell, (The Florida Institute of Technology, Melbourne, USA)
View RA on Cybersecurity Titles
Each Research Anthology (RA) in our collection is designed and provided by IGI Global to ease collection development for academic, corporate, and joint-use libraries. Our Editorial Team selects research sourced from published IGI Global chapters and articles from high-impact IGI Global publications.
Learn more about Research AnthologiesAbout IGI Global
Founded in 1988 and headquartered in Hershey, Pennsylvania, USA with a subsidiary office (IGI Science and Technology, Ltd.), operating out of Beijing, China, IGI Global is a leading medium-sized independent academic publisher of international scientific research. They are committed to facilitating the discovery of pioneering research that enhances and expands the body of knowledge available to the research community through traditional and open access publishing workflows. Working in close collaboration with expert researchers and professionals from leading institutions, IGI Global publishes quality peer-reviewed content across 350+ topics in 11 core subject areas, including business, computer science, education, engineering, healthcare, social sciences, and more. With over 150,000+ industry-leading researchers and experts worldwide contributing to IGI Global’s publications, they ensure that each contains the most emerging and timeliest research. Learn more about IGI Global here.
Emma Baronak
(717) 533-8845 ext. 183
ebaronak@igi-global.com
www.igi-global.com
Disclaimer: The opinions expressed in this article are the author’s own and do not reflect the views of IGI Global.