Books/Book Chapters/Edited Books

Permanent URI for this collectionhttp://192.168.24.11:4000/handle/123456789/237

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    Item
    Cyber Threat Migration: Perpetuating in the Healthcare Sector and Agriculture and Food Industries
    (IGI Global, 2023) Kainat Akhtar Usmani
    Globalization,’ ‘industrialization,’ ‘cyber connectivity,’ ‘digitalization,’ and ‘e-commerce’ are not fantasy words in today’s era. They all amalgamated towards the growth and development of every sector in the country. But as on other side of the coin, cyber security is on the verge of serious threats in digital world. The danger posed by cyber security threats in today’s world cannot be understated. The health sector, agriculture, and food and beverage industries are no exemptions. As they all are inter-related, they manage an array of assets, including infrastructure, applications, managed and unmanaged endpoints, mobile devices, and cloud services, all of which can be attacked. Information and cyber security are trending topics. As the security risk is scooping high, different organizations should take steps forward to protect themselves. This chapter focuses on the frightening hikes in incidences of cyber-attacks, and also focuses on major cyber security approaches to minimize the risk of cyber breaches and making these industries flourish like never before.
  • Thumbnail Image
    Item
    Advances in Cyberology and the Advent of the Next-Gen Information Revolution
    (IGI Global, 2023) Mohd Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmad, Saurabh Shukla
    The past decade has witnessed a leap in the cyber revolution around the world. Significant progress has been made across a broad spectrum of terminologies used in the cyber world. Various threats have also emerged due to this cyber revolution that requires far greater security measures than ever before. In order to adapt to this evolution effectively and efficiently, it calls for a better understanding of the ways in which we are ready to embrace this change. Advances in Cyberology and the Advent of the Next-Gen Information Revolution creates awareness of the information threats that these technologies play on personal, societal, business, and governmental levels. It discusses the development of information and communication technologies (ICT), their connection with the cyber revolution, and the impact that they have on every facet of human life. Covering topics such as cloud computing, deepfake technology, and social networking, this premier reference source is an ideal resource for security professionals, IT managers, administrators, students and educators of higher education, librarians, researchers, and academicians.
  • Thumbnail Image
    Item
    The Critical Analysis of E-Commerce Web Application Vulnerabilities
    (IGI Global, 2023) Gausiya Yasmeen; Syed Adnan Afaq
    Large-scale deployments of web applications occur continuously. The failure to validate or sanitize form inputs, improperly configured web servers, and application design flaws are the main causes of security vulnerabilities that continue to infect web applications, allowing hackers to access sensitive data and using legitimate websites as a breeding ground for malware. These vulnerabilities can be used to compromise the security of the application. The largest problem that enterprises face is how to create a web application that satisfies their needs for safe processes, E-Commerce, and the transmission of sensitive data. OWASP updates and releases a list of the top 10 web application vulnerabilities every few years. Along with the OWASP Top 10 Threats, this chapter also discusses each vulnerability's possible effects and how to avoid them. According to the OWSP (Open Online Application Security Project) Top Ten, this document analyses the most serious web vulnerabilities, their causes, and their impacts.