A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism

A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Maurice Dawson (Illinois Institute of Technology, USA)
DOI: 10.4018/978-1-5225-5634-3.ch010
OnDemand PDF Download:
No Current Special Offers


Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the world. This chapter discusses emerging laws, policies, processes, and tools that are changing the landscape of cyber security. This chapter provides an overview of the research to follow which will provide an in depth review of mobile security, mobile networks, insider threats, and various special topics in cyber security.
Chapter Preview

Digital Currency

Digital currency has become a new commerce that is growly quickly and gaining the attention of large financial institutions. This crypto currency has been termed “memory” in monetary economics literature (Luther & Olson, 2013). Bitcoin is a peer to peer electronic cash system in which no one controls and there are not an associated printed currency(Nakamoto, 2008). Bitcoin allows for anonymity to occur in this peer to peer electronic currency systems (Reid & Harrigan, 2013). Some argue that the main benefits are lost if a trusted third party is necessary to prevent the action of double spending (Nakamoto, 2008). The technical infrastructure of this decentralized digital currency relies on several cryptographic technologies.

Complete Chapter List

Search this Book: