![]() |
![]() |
Your cart is empty |
||
Showing 1 - 11 of 11 matches in All Departments
Trojans, Worms, and Spyware provides practical, easy to understand,
and readily usable advice to help organizations to improve their
security and reduce the possible risks of malicious code attacks.
Despite the global downturn, information systems security remains
one of the more in-demand professions in the world today. With the
widespread use of the Internet as a business tool, more emphasis is
being placed on information security than ever before. To
successfully deal with this increase in dependence and the ever
growing threat of virus and worm attacks, Information security and
information assurance (IA) professionals need a jargon-free book
that addresses the practical aspects of meeting new security
requirements.
Extremist Propaganda in Social Media: A Threat to Homeland Security presents both an analysis of the impact of propaganda in social media and the rise of extremism in mass society from technological and social perspectives. The book identifies the current phenomenon, what shall be dubbed for purposes of this book "Blisstopian Societies"-characterized in the abiding "ignorance is bliss" principle-whereby a population is complacent and has unquestioning acceptance of a social doctrine without challenge and introspection. In these subcultures, the malleable population self-select social media content, "news," and propaganda delivery mechanisms. By doing so, they expose themselves only to content that motivates, reinforces, and contributes to their isolation, alienation, and self-regulation of the social groups and individuals. In doing this, objective news is dismissed, fake-or news otherwise intended to misinform-reinforces their stereotyped beliefs about society and the world around them. This phenomenon is, unfortunately, not "fake news," but a real threat to which counterterror, intelligence, Homeland Security, law enforcement, the military, and global organizations must be hyper-vigilant of, now and into the foreseeable future. Chapters cite numerous examples from the 2016 political election, the Russia investigation into the Trump Campaign, ISIS, domestic US terrorists, among many other examples of extremist and radicalizing rhetoric. The book illustrates throughout that this contrived and manufactured bliss has fueled the rise and perpetuation of hate crimes, radicalism, and violence in such groups as ISIS, Boko Haram, Neo-Nazis, white separatists, and white supremacists in the United States-in addition to perpetuating ethnic cleansing actions around the world. This dynamic has led to increased political polarization in the United States and abroad, while furthering an unwillingness and inability to both compromise or see others' perspectives-further fomenting insular populations increasing willing to harm others and do violence. Extremist Propaganda in Social Media relates current Blisstopian practices to real-world hate speech and violence, connecting how such information is consumed by groups and translated into violent action. The book is an invaluable resources for those professionals that require an awareness of social media radicalization including: social media strategists, law enforcement, Homeland Security professionals, military planners and operatives-anyone tasked with countering combat such violent factions and fringes in conflict situations.
There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity.
Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.
This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. And it explains how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud. After reading this book, you'll be able to analyze how organizations work and the need for security to maintain operations and sustainability, and be able to identify, respond to and counter socially engineered threats to security.
Extremist Propaganda in Social Media: A Threat to Homeland Security presents both an analysis of the impact of propaganda in social media and the rise of extremism in mass society from technological and social perspectives. The book identifies the current phenomenon, what shall be dubbed for purposes of this book "Blisstopian Societies"-characterized in the abiding "ignorance is bliss" principle-whereby a population is complacent and has unquestioning acceptance of a social doctrine without challenge and introspection. In these subcultures, the malleable population self-select social media content, "news," and propaganda delivery mechanisms. By doing so, they expose themselves only to content that motivates, reinforces, and contributes to their isolation, alienation, and self-regulation of the social groups and individuals. In doing this, objective news is dismissed, fake-or news otherwise intended to misinform-reinforces their stereotyped beliefs about society and the world around them. This phenomenon is, unfortunately, not "fake news," but a real threat to which counterterror, intelligence, Homeland Security, law enforcement, the military, and global organizations must be hyper-vigilant of, now and into the foreseeable future. Chapters cite numerous examples from the 2016 political election, the Russia investigation into the Trump Campaign, ISIS, domestic US terrorists, among many other examples of extremist and radicalizing rhetoric. The book illustrates throughout that this contrived and manufactured bliss has fueled the rise and perpetuation of hate crimes, radicalism, and violence in such groups as ISIS, Boko Haram, Neo-Nazis, white separatists, and white supremacists in the United States-in addition to perpetuating ethnic cleansing actions around the world. This dynamic has led to increased political polarization in the United States and abroad, while furthering an unwillingness and inability to both compromise or see others' perspectives-further fomenting insular populations increasing willing to harm others and do violence. Extremist Propaganda in Social Media relates current Blisstopian practices to real-world hate speech and violence, connecting how such information is consumed by groups and translated into violent action. The book is an invaluable resources for those professionals that require an awareness of social media radicalization including: social media strategists, law enforcement, Homeland Security professionals, military planners and operatives-anyone tasked with countering combat such violent factions and fringes in conflict situations.
The physical security of IT, network, and telecommunications assets
is equally as important as cyber security. We justifiably fear the
hacker, the virus writer and the cyber terrorist. But the
disgruntled employee, the thief, the vandal, the corporate foe, and
yes, the terrorist can easily cripple an organization by doing
physical damage to IT assets. In many cases such damage can be far
more difficult to recover from than a hack attack or malicious code
incident. It does little good to have great computer security if
wiring closets are easily accessible or individuals can readily
walk into an office and sit down at a computer and gain access to
systems and applications.
This book shows what IT in organizations need to accomplish to
implement The National Strategy for the Physical Protection of
Critical Infrastructures and Key Assets and The National Strategy
to Secure Cyberspace which were developed by the Department of
Homeland Security after the terrorist attacks of September 2001.
Socially Responsible IT Management shows IT professionals how to
overcome the social crisis that has resulted from the wide-spread
use of information technology. By responsibly managing security
threats, protecting individual privacy, reducing hazardous waste,
and minimizing other negative effects on IT staff and computer
users, as well as ordinary citizens around the world, IT
professionals can benefit the society at large and reap rewards for
their own organizations as well.
Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.
Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.
|
![]() ![]() You may like...
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn
Paperback
|