LEADER 03755nam 22005653 450 001 9911009185503321 005 20251012110035.0 010 $a9781787783607 010 $a178778360X 035 $a(MiAaPQ)EBC6961991 035 $a(Au-PeEL)EBL6961991 035 $a(CKB)21605407900041 035 $a(BIP)083946840 035 $a(OCoLC)1313074265 035 $a(FR-PaCSA)88973527 035 $a(FRCYB88973527)88973527 035 $a(EXLCZ)9921605407900041 100 $a20220428d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDigital Earth $eCyber Threats, Privacy and Ethics in an Age of Paranoia 205 $a1st ed. 210 1$aEly :$cIT Governance Ltd,$d2022. 210 4$dİ2022. 215 $a1 online resource (108 pages) 311 08$aPrint version: Katz, Sarah Digital Earth Ely : IT Governance Ltd,c2022 9781787783591 327 $aCover -- Title -- Copyright -- About the author -- Acknowledgements -- Contents -- Introduction -- Chapter one: The spike in phishing amid the COVID-19 pandemic -- Key terms for this chapter -- Chaos theory in cyber threat mitigation -- The application of chaos theory to the assessment of phishing attacks -- Chapter two: A glance at the history of phishing mitigation practices -- The risk of phishing to federal health care agencies -- Applications of chaos theory in cyber threat mitigation, including phishing attacks -- Machine learning tools for phishing prevention -- Persuasive factors used in phishing attacks -- User awareness of email legitimacy verification techniques -- Chapter three: The hard truth - How little many users understand about identifying malicious emails -- Tackling email headers -- Next steps: Computer- assisted threat detection -- Chapter four: Disinformation versus misinformation in a post-COVID world -- Global information sharing -- Content moderators -- How to spot misinformation -- Managing content moderation: In theory and practice -- Next steps: Head above water in cyberspace -- Chapter five: Cyber terrorism and the firepower of social media -- Why convey a message to the masses? -- Making it look alluring -- Using social media to attract and recruit -- Next steps: Keep an eye on that friend request -- Chapter six: Drones - A search and rescue solution or the all-seeing eye in the sky? -- The technicalities of civilian privacy in UAV criminal investigation -- San Jose as a case study -- Those opposed -- Those in favor -- Calming the public outcry -- Balancing technological surveillance measures with public interest -- Next steps: Securing the wireless target -- Recent developments -- Chapter seven: Tying it all together -- Appendix A: Bibliography -- Further reading. 330 $aAn accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives. 606 $aLAW / Computer & Internet$2bisacsh 606 $aCOMPUTERS / Security / General$2bisacsh 606 $aLAW / Communications$2bisacsh 606 $aLAW / Criminal Law / General$2bisacsh 610 $aMathematics 615 7$aLAW / Computer & Internet 615 7$aCOMPUTERS / Security / General 615 7$aLAW / Communications 615 7$aLAW / Criminal Law / General 676 $a005.8 700 $aKatz$b Sarah$01826457 712 02$aIT Governance Publishing,$4edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911009185503321 996 $aDigital Earth$94394449 997 $aUNINA