Affiliation:
1. Illinois Institute of Technology, USA
2. Nawroz University, Iraq
3. Colorado Technical University, USA
4. National Graduate School of Quality Management, USA
Abstract
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality. Further reviewed are some examples of the complex attacks that could interrupt human-robot interaction, children-computer interaction, mobile computing, social networks, and human-centered issues in security design.
Reference72 articles.
1. Armbrust, M., Fox, A., Griftlth, R., Joseph, A. D., Katz, R., Konwinski, A., & Zaharia, M. (201 0). A view of cloud computing. Communications oft he ACM, 53(4), 50-58.
2. BackTrack Linux. (2011). BackTrack Linux. Retrieved March 22, 2013, from www.backtracklinux.org
3. Becher, M., Freiling, F., & Leider, B. (2007). On the effort to create smartphone worms in Windows Mobile. In Proceedings ofthe 2007 IEEE Workshop on Information Assurance. United States Military Academy. Retrieved March 22, 2013, from http://pil.informatik.uni-mannheim. de/filepool/publications/on-the-effort-to-create-smartphone-worms-in-windows-mobile.pdf
4. Beidleman, S. W. (2009). Defining and Deterring Cyber War. Barracks, PA Army War College. Retrieved March I0, 2013, from http://www.hsdl.org/?abstract&doc=ll8653&coll=limited
5. Bhattacharya, D. (2008) Leardership styles and information security in small businesses: An empirical investigation. (Doctoral dissertation, University of Phoenix). Retrieved March 9, 2013, from www.phoenix.edu/apololibrary
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing IoT Security;Advances in Information Security, Privacy, and Ethics;2024-06-30
2. Decision Trees Unleashed;Advances in Medical Technologies and Clinical Practice;2024-04-12
3. Harnessing GPT-2 for Feature Extraction in Malware Detection: A Novel Approach to Cybersecurity;Land Forces Academy Review;2024-02-28
4. Beyond Traditional Learning;Advances in Medical Technologies and Clinical Practice;2024-02-27
5. Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity;Securing the Internet of Things;2020