Books/Book Chapters/Edited Books

Permanent URI for this collectionhttp://192.168.24.11:4000/handle/123456789/237

Browse

Search Results

Now showing 1 - 4 of 4
  • Thumbnail Image
    Item
    A Comprehensive Analysis of Vulnerabilities and Cybersecurity Issues for Digital Agriculture and Food Industry
    (Taylor & Francis CRC Press, 2025) Gausiya Yasmeen, Syed Adnan Afaq, Saman Uzma
    The foundation of practically all countries in the globe is agriculture. Every cycle's area, from jobs to satiating food needs, is affected. The world's population is expanding more swiftly, which necessitates feeding more stomachs. To fulfill the growing demand for food, smart technology like IoT – Internet of Things – is already being applied in agriculture. Due to the widespread use of IoT technologies, virtually every sector of the economy, including food and agriculture, is also affected by digital transformation. Smart gadgets are routinely utilized by an extensive throng, including farmers and business owners. Such kinds of instruments are utilized in varied ways, from employing drones to assist with tasks like pesticide spraying to continuously nursing the health of harvests and the humidity content of the soil. The advantages of smart agriculture are immense; the condition of soil and seed traits can be observed using smart data, and new technology can provide conveniences never before possible while also enhancing the management and standard of agricultural farming. The advancement of agriculture to smart farming has resulted in an increase in cyber threats. Smart farming ecosystems are, however, exposed to a variety of cybersecurity threats and vulnerabilities due to the employing of IoT and smart communication technologies. Ransomware is the cyberattack that affects the food industry the most frequently right now. Such hacks may cause economic instability in countries that heavily rely on agriculture. As per reports food inflation has risen up to 4.5% which was earlier 3% in the year 2023. Moreover, this year was declared “El Nino” which can result in growth of the hunger index in poor nations. So, modern cultures' food supply chains are essential components. It employs network connections and is fully digitalized, just like other facets of life. Nevertheless, the widespread practice of technical know-how comes with built-in security dangers and weaknesses, and both industries are now under more scrutiny than ever. The chapter presents a complete study on the protection and confidentiality related to food industries and agriculture sector data.
  • Thumbnail Image
    Item
    Cyber Threat Migration: Perpetuating in the Healthcare Sector and Agriculture and Food Industries
    (IGI Global, 2023) Kainat Akhtar Usmani
    Globalization,’ ‘industrialization,’ ‘cyber connectivity,’ ‘digitalization,’ and ‘e-commerce’ are not fantasy words in today’s era. They all amalgamated towards the growth and development of every sector in the country. But as on other side of the coin, cyber security is on the verge of serious threats in digital world. The danger posed by cyber security threats in today’s world cannot be understated. The health sector, agriculture, and food and beverage industries are no exemptions. As they all are inter-related, they manage an array of assets, including infrastructure, applications, managed and unmanaged endpoints, mobile devices, and cloud services, all of which can be attacked. Information and cyber security are trending topics. As the security risk is scooping high, different organizations should take steps forward to protect themselves. This chapter focuses on the frightening hikes in incidences of cyber-attacks, and also focuses on major cyber security approaches to minimize the risk of cyber breaches and making these industries flourish like never before.
  • Thumbnail Image
    Item
    Advances in Cyberology and the Advent of the Next-Gen Information Revolution
    (IGI Global, 2023) Mohd Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmad, Saurabh Shukla
    The past decade has witnessed a leap in the cyber revolution around the world. Significant progress has been made across a broad spectrum of terminologies used in the cyber world. Various threats have also emerged due to this cyber revolution that requires far greater security measures than ever before. In order to adapt to this evolution effectively and efficiently, it calls for a better understanding of the ways in which we are ready to embrace this change. Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians.
  • Thumbnail Image
    Item
    The Critical Analysis of E-Commerce Web Application Vulnerabilities
    (IGI Global, 2023) Gausiya Yasmeen; Syed Adnan Afaq
    Large-scale deployments of web applications occur continuously. The failure to validate or sanitize form inputs, improperly configured web servers, and application design flaws are the main causes of security vulnerabilities that continue to infect web applications, allowing hackers to access sensitive data and using legitimate websites as a breeding ground for malware. These vulnerabilities can be used to compromise the security of the application. The largest problem that enterprises face is how to create a web application that satisfies their needs for safe processes, E-Commerce, and the transmission of sensitive data. OWASP updates and releases a list of the top 10 web application vulnerabilities every few years. Along with the OWASP Top 10 Threats, this chapter also discusses each vulnerability's possible effects and how to avoid them. According to the OWSP (Open Online Application Security Project) Top Ten, this document analyses the most serious web vulnerabilities, their causes, and their impacts.