Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.
Download full-text PDF |
Source |
---|
Sci Justice
November 2024
Department of Artificial Intelligence, Lviv Polytechnic National University, S. Bandera st. 29, Lviv, 79013, Ukraine. Electronic address:
The Metaverse is an intersection of virtual, augmented, and mixed reality that offers users an interactive virtual environment. This new technology has enormous possibilities for both people and companies. However, owing to the existence of inherent vulnerabilities associated with Metaverse, misconduct is a major concern.
View Article and Find Full Text PDFFront Psychol
November 2024
Institution of Criminology, Hebrew University of Jerusalem, Jerusalem, Israel.
Introduction: The effectiveness of human-centric cybersecurity largely depends on end-users' adherence to security and privacy behaviors. Understanding and predicting variations in the adoption of these safeguards is crucial for both theoretical advancement and practical application. While existing frameworks are often adapted from health science literature, there is potential to enhance these models by incorporating criminological constructs relevant to online victimization.
View Article and Find Full Text PDFPLoS One
October 2024
Faculty of Criminal Justice and Security, University of Maribor, Ljubljana, Slovenia.
Cyberattacks pose a significant business risk to organizations. Although there is ample literature focusing on why people pose a major risk to organizational cybersecurity and how to deal with it, there is surprisingly little we know about cyber and information security decision-makers who are essentially the people in charge of setting up and maintaining organizational cybersecurity. In this paper, we study cybersecurity awareness of cyber and information security decision-makers, and investigate factors associated with it.
View Article and Find Full Text PDFViolence Vict
October 2024
Department of Criminology and Criminal Justice, Southern Illinois University Carbondale, Carbondale, IL, USA.
This study evaluated the prevalence rates and risk factors for cyberbullying victimization and perpetration among 7th-12th grade students ( = 3,396) enrolled in 22 public school districts across Southern Illinois. Risk factors included victimization by traditional bullying, gender identity, cell phone use, and social media usage. We also examined perceptions of school climate and safety.
View Article and Find Full Text PDFHeliyon
June 2024
School of Law, University of Jordan, Amman, Jordan.
In contemporary times, there has been a rapid increase in the utilization of the Internet and information technology by students. As a result, educational instructors worldwide have encountered a significant issue due to an unprecedented level of reliance and, to a large extent, dependency on such technology. Furthermore, akin to any analogous emerging social phenomenon, this dependency on technology has engendered novel spectrums of unlawful and illicit conduct.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!