Attributes | Values |
---|
rdf:type
| |
Description
| - Ongoing rapid development in information technologies and increasing dependency of the mankind on cyberspace creates new emerging threats more dangerous than ever before. Retail and e-shop attack will outpace attack targeting banks and financial institutions while hospitals become the most exploitable is-sue. Identity theft will dramatically increase losses of e-shop operators and increase number of subsidi-ary court cases. The dependency of mankind on the computers and computer networks will decrease his alertness creat-ing him an easy target. Social networks such as Twitter and Facebook are extending their services for third party development through the use of application programming interfaces (APIs). The social engi-neering in majority using data from social networks will enter a new era of internet exploitation utilizing sophisticated virtual identities covered by L2 anonymizers and methods of artificial intelligence. Also there is an expectation of growing privacy right violation by governments and governmental agencies in the name of cyber defense. Also big corporation will collect and process the data which, collected in the large amount, could lead to the violation privacy rights. The Virtual Environment will be specifically targeted by cybercriminals and cyberterrorist resulting in new way of attacker strategies. The complexity of Virtual Environment creates room for new sophisti-cated attack and large data storages in clouds make data pirates' life easier. The exploit will be more fo-cused to cause physical or other sensitive damage by penetrating the lowest levels of systems. The mo-bile cell phones and PDA becomes natural target mainly by misleading users to download so called %22trusted application%22 software. Using many different communication channels like wi-fi, GSM or Blue-tooth, the mobile device became very sensitive to outer attacks.
- Ongoing rapid development in information technologies and increasing dependency of the mankind on cyberspace creates new emerging threats more dangerous than ever before. Retail and e-shop attack will outpace attack targeting banks and financial institutions while hospitals become the most exploitable is-sue. Identity theft will dramatically increase losses of e-shop operators and increase number of subsidi-ary court cases. The dependency of mankind on the computers and computer networks will decrease his alertness creat-ing him an easy target. Social networks such as Twitter and Facebook are extending their services for third party development through the use of application programming interfaces (APIs). The social engi-neering in majority using data from social networks will enter a new era of internet exploitation utilizing sophisticated virtual identities covered by L2 anonymizers and methods of artificial intelligence. Also there is an expectation of growing privacy right violation by governments and governmental agencies in the name of cyber defense. Also big corporation will collect and process the data which, collected in the large amount, could lead to the violation privacy rights. The Virtual Environment will be specifically targeted by cybercriminals and cyberterrorist resulting in new way of attacker strategies. The complexity of Virtual Environment creates room for new sophisti-cated attack and large data storages in clouds make data pirates' life easier. The exploit will be more fo-cused to cause physical or other sensitive damage by penetrating the lowest levels of systems. The mo-bile cell phones and PDA becomes natural target mainly by misleading users to download so called %22trusted application%22 software. Using many different communication channels like wi-fi, GSM or Blue-tooth, the mobile device became very sensitive to outer attacks. (en)
|
Title
| - Emerging Threats in 21st Century Cyberspace
- Emerging Threats in 21st Century Cyberspace (en)
|
skos:prefLabel
| - Emerging Threats in 21st Century Cyberspace
- Emerging Threats in 21st Century Cyberspace (en)
|
skos:notation
| - RIV/68407700:21260/11:00190235!RIV12-MV0-21260___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/68407700:21260/11:00190235
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - cyberspace, cyber attacks, emerging threats (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - ISSE 2011 Securing Electronic Business Processes
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| |
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| - Springer Fachmedien Wiesbaden Gmbh
|
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |