Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities, 1st Edition

  • Maximiliano E. Korstanje
  • Published By:
  • ISBN-10: 1522519394
  • ISBN-13: 9781522519393
  • DDC: 363.325
  • Grade Level Range: College Freshman - College Senior
  • 315 Pages | eBook
  • Original Copyright 2017 | Published/Released April 2018
  • This publication's content originally published in print form: 2017

  • Price:  Sign in for price



Technology provides numerous opportunities for positive developments in modern society; however, these venues inevitably increase vulnerability to threats in online environments. Addressing issues of security in the cyber realm is increasingly relevant and critical to society. This book is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests, this book is ideally designed for academics, researchers, graduate students, professionals, and practitioners actively involved in the expanding field of cyber security.

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series.
Titles in this Series.
Table of Contents.
Detailed Table of Contents.
Cyber Security in Global Times.
1: A Simple Solution to Prevent Parameter Tampering in Web Applications.
2: Cyber Security Centres for Threat Detection and Mitigation.
3: Methods and Tools of Big Data Analysis for Terroristic Behavior Study and Threat Identification: Illegal Armed Groups during the Conflict in Donbas Region (East Ukraine) in Period 2014-2015.
The Meaning of Security and Cyber Risk.
4: Analysis of Cyber-Attacks against the Transportation Sector.
5: English Speaking Countries and the Culture of Fear: Understanding Technology and Terrorism.
6: Trolls Just Want to Have Fun: Electronic Aggression within the Context of E-Participation and Other Online Political Behaviour in the United Kingdom.
7: The Risk, the Real, and the Impossibility of Life: Examining the Matrix.
CyberTerrorism and Civil Riots.
8: OSNs as Cyberterrorist Weapons against the General Public.
9: The Fight for Cyber Thoreau: Distinguishing Virtual Disobedience from Digital Destruction.
10: Twitter Use in Student Protests: The Case of South Africa’s #FeesMustFall Campaign.
11: The Roots of Terror: The Lesser Evil Doctrine under Criticism.
Compilation of References.
About the Contributors.