In an era of unprecedented volatile political and economic environments across the world, computer-based cyber security systems face ever growing challenges. While the internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber crime. The debate over how to plan for the cyber security of the future has focused the minds of developers and scientists alike. This book aims to provide a reference on current and emerging issues on systems security from the lens of autonomy, artificial intelligence and ethics as the race to fight and prevent cyber crime becomes increasingly pressing.Contents: Introduction: It's Time to Make the Case for Ethics (Ali G Hessami)Attack Vectors and the Challenge of Preventing Data Theft (David A E Haddon)Management of a Cyber Attack (Thomas Welsh)Practical Cyber Security for Digital Trains (George Copeland)An Approach to Identify Risk-Based Human Behaviour Profiling Within an Office Environment (Jon Cosson, Haider M al-Khateeb, Stephen Sampana)Ransomware (Usman Javed Butt, Arvind Kumar)Protecting and Securing Data Through Blockchain Across Industries (Stefan Kendzierskyj, Hamid Jahankhani)Bring Your Own Device: GDPR Compliant or Headache? The Human Aspect in Security and Privacy (Jaime Ibarra Jimenez, Hamid Jahankhani)GDPR Compliance: Incident Response and Breach Notification Challenges (Orret R Grey, Raymond Brown)Evaluation of the Standardised Digital Forensic Investigation Process Model (SDFIPM) (Reza Montasari, Richard Hill, Victoria Carpenter, Amin Hosseinian-Far)Blockchain of Custody, BoC (Ian Mitchell, Sukhvinder Hara, Hamid Jahankhani, David Neilson)New Issues in Cyber Security Forensics (Firas Hazzaa, Sufian Yousef)Ethical Considerations and a Proposed Support Process When Employing People With Autistic Spectrum Disorder in Cyber Security Roles (John Goldie, Hamid Jahankhani)An Ethical Approach to Understanding Cyber Security (Ojo Emmanuel Ademola)An Analysis of Data Mining Metrics to Identify and Evaluate Potential Radicalisation Utilising Social Media (Nishan Chelvachandran, Hamid Jahankhani)The European Union's General Data Protection Regulation (GDPR) (Sérgio Tenreiro de Magalhães)
Readership: As a handbook, this volume aims to provide a reference for the body of knowledge that has been developed against cybersecurity attacks. It is primarily aimed at experts and governments, corporations, security firms, and individuals planning for cyber security of the future. Cyber Security;Blockchain;Attack Vectors;Digital Forensics;Cyber Ethics;Chain of Custody;Firewall;Data Exfiltration;Cross-Site;Emerging Threats;Threat Landscape;Advanced Persistent Threat;Tunneling;Covert Channel;Cyber Resilience;Critical Infrastructure;IoT;System of Systems0Key Features:Latest research and development in defending cyber spaceState of the art research disseminationFacets/ issues of the cyber security from the practitioner's angle in the era of Autonomy, Artificial Intelligence and Ethics