Advertisement

Introduction

  • Ganna PogrebnaEmail author
  • Mark Skilton
Chapter

Abstract

This chapter lays the foundation for the issues discussed in the book. We consider topical problems related to the paradigm shift in understanding our personal physical and digital rights as well as in rethinking business security and safety to fit the contemporary landscape of the global digital economy. We argue that in the current digital age, where rapid advances of technology reshape our understanding of secure and safe spaces, existing tools are no longer sufficient to safeguard personal data and commercial secrets. A new human-centered approach is necessary to successfully anticipate and address cybersecurity risks.

References

  1. 1.
    Edward Snowden Biography. Accessed September 2018. https://www.biography.com/people/edward-snowden-21262897.
  2. 2.
    Greenwald, G. (2013, June 6). NSA collecting phone records of millions of Verizon customers daily. The Guardian. https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order.
  3. 3.
    Greenwald, G., MacAskill, E., & Poitras, L. (2013, June 11). Edward Snowden: The whistleblower behind the NSA surveillance revelations. The Guardian. https://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance.
  4. 4.
    Franceschi-Bicchierai, L. (2014, June 5). The 10 biggest revelations from Edward Snowden’s leaks. MashablesUK. https://mashable.com/2014/06/05/edward-snowden-revelations/?europe=true#E9W_W2HdFPqV.
  5. 5.
    Assange, J.,& Rusbridger, A. (2011, January). WikiLeaks: The Guardian’s role in the biggest leak in the history of the world. The Guardian. https://www.theguardian.com/media/2011/jan/28/wikileaks-julian-assange-alan-rusbridger.
  6. 6.
    Chelsea Manning Biography. Accessed September 2018. https://www.biography.com/people/chelsea-manning-21299995.
  7. 7.
    Ellison‚ S. (2011, February). The Man who spilled the secrets. Vanity Fair. https://www.vanityfair.com/news/2011/02/the-guardian-201102.
  8. 8.
    Stempel, J., & Finkle, J. (2017, October ). Yahoo says all three billion accounts hacked in 2013 data theft. Reuters. https://www.reuters.com/article/us-yahoo-cyber/yahoo-says-all-three-billion-accounts-hacked-in-2013-data-theft-idUSKCN1C82O1.
  9. 9.
    Perlroth, N. (2016, September). Yahoo says hackers stole data on 500 million users in 2014. New York Times. https://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html.
  10. 10.
    Evens, M. (2015, February). Hackers steal £650 million in world’s biggest bank raid. The Telegraph. https://www.telegraph.co.uk/news/uknews/crime/11414191/Hackers-steal-650-million-in-worlds-biggest-bank-raid.html.
  11. 11.
    Palmer, D. (2018, May). WannaCry ransomware crisis, one year on: Are we ready for the next global cyber attack? zdnet. https://www.zdnet.com/article/wannacry-ransomware-crisis-one-year-on-are-we-ready-for-the-next-global-cyber-attack/.
  12. 12.
    Ghena, B., Beyer, W., Hillaker, A., Pevarnek, J., & Halderman, J. A. (2014, August ) Green lights forever: Analyzing the security of traffic infrastructure. In Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT’14).Google Scholar
  13. 13.
    Greenberg, A. (2015, July). Hackers remotely kill a jeep on the highway—With me in it. Wired. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/.
  14. 14.
    Perez, E. (2015, May 19). FBI: Hacker claimed to have taken over flight’s engine controls. CNN. https://edition.cnn.com/2015/05/17/us/fbi-hacker-flight-computer-systems/index.html.
  15. 15.
    Valero, J. (2016, July). Hackers bombard aviation sector with over 1000 attacks per month. EuroActiv. https://www.euractiv.com/section/justice-home-affairs/news/hackers-bombard-aviation-sector-with-more-than-1000-attacks-per-month/.
  16. 16.
    Jay J. (2018, May). Healthcare sector suffered more than half of all cyber-attacks in 2017. SC Media. https://www.scmagazineuk.com/healthcare-sector-suffered-half-cyber-attacks-2017/article/1472744.
  17. 17.
    2017 Cylance Threat Report. Accessed September 2018. https://pages.cylance.com/2018-03CylanceThreatReport2017.html.
  18. 18.
    Hern, A. (2017, August 31). Hacking risk leads to recall of 500,000 pacemakers due to patient death fears. The Guardian. https://www.theguardian.com/technology/2017/aug/31/hacking-risk-recall-pacemakers-patient-death-fears-fda-firmware-update.
  19. 19.
    Smith, R. (2018, July 23). Russian hackers reach U.S. utility control rooms, Homeland security officials say. Wall Street Journal. https://www.wsj.com/articles/russian-hackers-reach-u-s-utility-control-rooms-homeland-security-officials-say-1532388110.
  20. 20.
    Rosenbush, S. (2017, November 16). The morning download: First AI-powered cyberattacks are detected. CIO Journal, Wall Street Journal. https://blogs.wsj.com/cio/2017/11/16/the-morning-download-first-ai-powered-cyberattacks-are-detected/.
  21. 21.
    Giles, M. (2018, January). Six cyberthreats to really worry about in 2018. MIT Technology Review. https://www.technologyreview.com/s/609641/six-cyber-threats-to-really-worry-about-in-2018/.
  22. 22.
    Ukraine power cut “was cyber-attack”. (2017, January 11). BBC. https://www.bbc.co.uk/news/technology-38573074.
  23. 23.
    Dickinson, B. (2017, May 3). This is what fraud looks like in the age of Artificial Intelligence. The NextWeb. https://thenextweb.com/contributors/2017/05/03/what-fraud-looks-like-in-the-age-of-artificial-intelligence/.
  24. 24.
    AI and ML curbing financial fraud. (2018, March 6). Fintech Futures. https://www.bankingtech.com/2018/03/ai-and-ml-curbing-financial-fraud/.
  25. 25.
    Williams, S. (2017, May 12). Inside China’s phoney “click farm”: Tiny office uses 10,000 handsets to send fake ratings and “likes” for boosting clients’ online popularity. The DailyMail. https://www.dailymail.co.uk/news/article-4499730/click-farm-10-000-phones-boost-product-ratings.html.
  26. 26.
    Tackling the challenges of securing a trillion connected devices at Arm TechCon 2017. (2017, September 6). ARM TechCon2017. https://www.arm.com/company/news/2017/09/tackling-the-challenges-of-securing-a-trillion-connected-devices-at-arm-techcon-2017.
  27. 27.
    Secure-by-design. UK Government. Published 7 March 2018. https://www.gov.uk/government/publications/secure-by-design.
  28. 28.
    Pratt, M. K. (2018, January 16). What is Zero Trust? A model for more effective security. CSO. https://www.csoonline.com/article/3247848/network-security/what-is-zero-trust-a-model-for-more-effective-security.html.
  29. 29.
    Bird, J. (2018, September 26). AI is not a “silver bullet” against cyber attacks. Financial Times. https://www.ft.com/content/14cd2608-869d-11e8-9199-c2a4754b5a0e.
  30. 30.
    The White House just issued a Defcon scale for cyber attacks. (2016, August 3). The Fanatical Futurist. https://www.fanaticalfuturist.com/2016/08/the-white-house-issued-a-defcon-scale-for-cyber-attacks/.
  31. 31.
    Lee, D. (2018, September). Facebook security breach: Up to 50 m accounts attacked. BBC News. https://www.bbc.co.uk/news/technology-45686890.
  32. 32.
    Kuckler, H. (2018, September 28). Facebook reveals cyber attack affecting up to 50 m users. Financial Times. https://www.ft.com/content/c5f13f30-c33f-11e8-8d55-54197280d3f7.

Copyright information

© The Author(s) 2019

Authors and Affiliations

  1. 1.University of BirminghamBirminghamUK
  2. 2.The Alan Turing InstituteLondonUK
  3. 3.Warwick Business SchoolUniversity of WarwickCoventryUK

Personalised recommendations