Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things

Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things

Maurice Dawson, Marwan Omar, Jonathan Abramson, Brian Leonard, Dustin Bessette
DOI: 10.4018/978-1-5225-0703-1.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.
Chapter Preview
Top

Laws And Policies To Combat Terrorism

The events of 9/ll not only changed policies with the U.S. but also policies with other countries in how they treat and combat terrorism. The United Nations (U.N.) altered Article 51 of the U.N. charter. This article allows members of the U.N. to take necessary measures to protect themselves against an armed attack to ensure international peace and security.

Israel is a country with some of the most stringent policies towards national and international security. This country requires all citizens to serve in the military to include multiple checkpoints throughout the country. This country has utilized stringent checks in the airport long before 9/11, however, now they have additional measures to ensure the nation's security as they are surrounded by countries that have tried to invade before. Israel has also deployed more Unmanned Air Vehicles (UAVs), and Unmanned Ground Vehicles (UGVs) to patrol the border in the event something occurs.

Key Terms in this Chapter

Hyperconnectivity: Use of multiple means of communications such as instant messaging, phones, Web 2.0, Web 3.0, and other communication methods.

Integrity: Quality of an IS reflecting the logical correctness and reliability of the operating system; the logical completeness of the hardware and software implementing the protection mechanisms; and the consistency of the data structures and occurrence of the stored data. Note that, in a formal security mode, integrity is interpreted more narrowly to mean protection against unauthorized modification or destruction of information.

Availability: Timely, reliable access to data and information services for authorized users.

Authentication: Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information.

Cloud Computing: Comprised of both the application delivered as services over the Internet and the hardware and systems software housed in the datacenters that provide those services (Armbrust, et al, 2010).

Non Repudiation: Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data.

Open Source Software: Software that allows the original source code to be free available which may be freely redistributed or modified (Perens, 2009 AU184: The in-text citation "Perens, 2009" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ).

Confidentiality: Assurance that information is not disclosed to unauthorized individuals, processes, or devices.

Complete Chapter List

Search this Book:
Reset