Malware at its worst: death and destruction

Author:

Brody Richard G.,Chang Harold U.,Schoenberg Erich S.

Abstract

Purpose Most people are probably aware of malware, but they may not be aware of malware in what may be its most dangerous form, i.e. causing physical harm, even death, to individuals. This paper aims to document how software can cause malicious harm to individuals by attacking modern systems that appear to be neglected and under-researched. Design/methodology/approach This paper will review some of the most significant areas of concern with respect to end of days malware, i.e. malware that has a dangerous intent. The areas included are automobiles, medical devices and air traffic control systems. Findings The potential harmful effects of malware are often not well known by consumers and businesses around the world. These issues are not limited to just financial harm. Lives can actually be in danger. Underestimating the importance of cybersecurity and understanding the dangers that are associated with advancing technology are global issues that will continue unless there is enough awareness to force businesses and governments to address these issues. It is critical that safeguards are established. Originality/value While many papers have been written about malware and the implications of having malicious software infect a computer or a network, little attention has been paid to “end of days” malware. With advancing technology, malware now has the ability to cause serious injury or death to individuals who have minimal or no knowledge of the potential consequences of, for example, driving in an automobile, wearing or having an internal medical device or flying on an airplane. It is up to businesses and governments to address these issues.

Publisher

Emerald

Subject

General Economics, Econometrics and Finance,Accounting,Management Information Systems

Reference29 articles.

1. Conger, K. (2017), “Hacking the army”, TechCrunch, 19 January, available at: https://techcrunch.com/2017/01/19/hacking-the-army/

2. Constantin, L. (2016), “Your car’s computers might soon get malware protection”, CSO Online, IDG News Service, 7 April, available at: www.csoonline.com/article/3053108/security/your-cars-computers-might-soon-get-malware-protection.html

3. Cooper, A. (2015), “Report: air traffic control system vulnerable to cyber-attack – CNNPolitics”, CNN, Cable News Network, 2 March, available at: www.cnn.com/2015/03/02/politics/cyberattack-faa-air-traffic-control-hacking/index.html

4. Dawson, C. (2017), “The dangers of the hackable car”, Wall Street Journal, 18 September, available at: www.wsj.com/articles/the-dangers-of-the-hackable-car-1505700481

5. Driving with sharks: rethinking connected vehicles with vehicle cybersecurity;IEEE Vehicular Technology Magazine,2017

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Information and telecommunications diplomacy in the context of international security at the United Nations;Transforming Government: People, Process and Policy;2020-05-20

2. On the Feasibility of Acoustic Attacks Using Commodity Smart Devices;2020 IEEE Security and Privacy Workshops (SPW);2020-05

3. The effect of data breaches on company performance;International Journal of Accounting & Information Management;2020-03-20

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3