Digital Earth: Cyber threats, privacy and ethics in an age of paranoia
By Sarah Katz and Georgina Morton
()
About this ebook
Whether it’s the next big ransomware attack or cyber terrorism, digital threats have evolved drastically in recent years. Issues surrounding phishing, misinformation, cyber terrorism, physical security, and privacy continue to arise for both individual users and large enterprises.
With technology an intrinsic part of our everyday lives, we need to be aware of digital threats, and be able to identify other threats such as phishing, ransomware, and spyware before they can wreak havoc in our professional or personal lives.
This book discusses the most prevalent technological threats that we face today. It is an accessible guide that highlights the most common cyber attacks, and explores data ethics and privacy in an age where we hold so much of our PII (personally identifiable information) online.
It covers cyber threats such as phishing, disinformation versus misinformation in a post-COVID-19 world, cyber terrorism, and the power of social media, and analyzes ever-evolving privacy concerns in response to technological advances. For example, does the use of drones by law enforcement offer us complete security or raise questions around the privacy of citizens?
The book focuses on:
- The spike in phishing amid the COVID-19 pandemic
- Cyber terrorism
- The risks associated with social media
- Whether drones are a search-and-rescue solution or the all-seeing eye in the sky
Sarah Katz
Sarah Katz is a graduate of UC Berkeley with a background in cybersecurity. She works as a Technical Writer at Microsoft, and previously worked at NASA. Her writing has appeared in Cyber Defense Magazine, Dark Reading, Infosecurity Magazine, and Tech Xplore. Sarah has served as a cybersecurity speaker for the Brazilian technical institute IGTI, and is pursuing a PhD in cyberpsychology with a focus on user security in augmented reality. The short film “Rationale” – currently in production – based on her eponymous short story and published in Thriller Magazine, is about the risks of using mood-altering technology to enhance cognition.
Related to Digital Earth
Related ebooks
Cybercrime and the Darknet: Revealing the hidden underworld of the internet Rating: 5 out of 5 stars5/5Landscape of Cybersecurity Threats and Forensic Inquiry Rating: 0 out of 5 stars0 ratingsPersonal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsCybersecurity Law, Standards and Regulations, 2nd Edition Rating: 0 out of 5 stars0 ratingsCybersecurity in Our Digital Lives Rating: 5 out of 5 stars5/5Cyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsPrivacy in the Modern Age: The Search for Solutions Rating: 4 out of 5 stars4/5The Effects of Cybercrime in the U.S. and Abroad Rating: 0 out of 5 stars0 ratingsSecurity in the Digital World Rating: 0 out of 5 stars0 ratingsCybersecurity for Small Businesses and Nonprofits Rating: 0 out of 5 stars0 ratingsThe True Cost of Information Security Breaches and Cyber Crime Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 1: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 2: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsArtificial Intelligence: Ethical, social, and security impacts for the present and the future Rating: 0 out of 5 stars0 ratingsThe Ransomware Handbook: How to Prepare for, Prevent, and Recover from Ransomware Attacks Rating: 4 out of 5 stars4/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsThe Survival Guide to Maintaining Access and Evading Detection Post-Exploitation Rating: 0 out of 5 stars0 ratingsBiggest Cyber Crimes in the History Rating: 0 out of 5 stars0 ratingsAI Folies: AI Generated Fictional Cases Unveiled: AI and Tech Folies Rating: 0 out of 5 stars0 ratingsRegulating Cross-Border Data Flows: Issues, Challenges and Impact Rating: 0 out of 5 stars0 ratingsAn Executive Guide CCPA: The Why, When, Where, What , and Who Guide to the California Consumer Privacy Act -2018 Rating: 0 out of 5 stars0 ratingsThe Offensive Internet: Speech, Privacy, and Reputation Rating: 0 out of 5 stars0 ratingsInternet Governance: The NETmundial Roadmap Rating: 0 out of 5 stars0 ratingsPrivacy And Cybersecurity A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsThe History of Cybercrime Rating: 0 out of 5 stars0 ratingsThe Manager’s Guide to Cybersecurity Law: Essentials for Today's Business Rating: 5 out of 5 stars5/5Industry of Anonymity: Inside the Business of Cybercrime Rating: 2 out of 5 stars2/5Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers Rating: 0 out of 5 stars0 ratings
Law For You
Legal Words You Should Know: Over 1,000 Essential Terms to Understand Contracts, Wills, and the Legal System Rating: 4 out of 5 stars4/5The Source: The Secrets of the Universe, the Science of the Brain Rating: 4 out of 5 stars4/5Law For Dummies Rating: 4 out of 5 stars4/5The ZERO Percent: Secrets of the United States, the Power of Trust, Nationality, Banking and ZERO TAXES! Rating: 5 out of 5 stars5/5Secrets of Criminal Defense Rating: 5 out of 5 stars5/58 Living Trust Forms: Legal Self-Help Guide Rating: 5 out of 5 stars5/5Verbal Judo, Second Edition: The Gentle Art of Persuasion Rating: 4 out of 5 stars4/5The Socratic Method: A Practitioner's Handbook Rating: 4 out of 5 stars4/5Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America Rating: 4 out of 5 stars4/5Win In Court Every Time Rating: 5 out of 5 stars5/5Divorcing a Narcissist: The Lure, the Loss and the Law Rating: 0 out of 5 stars0 ratingsThe Paralegal's Handbook: A Complete Reference for All Your Daily Tasks Rating: 4 out of 5 stars4/5Estate & Trust Administration For Dummies Rating: 0 out of 5 stars0 ratingsLegal Writing in Plain English: A Text with Exercises Rating: 3 out of 5 stars3/5Paralegal Career For Dummies Rating: 5 out of 5 stars5/5The Common Law Rating: 4 out of 5 stars4/5The Everything Guide To Being A Paralegal: Winning Secrets to a Successful Career! Rating: 5 out of 5 stars5/5Criminal Law Rating: 0 out of 5 stars0 ratingsLegal Writing: QuickStudy Laminated Reference Guide Rating: 0 out of 5 stars0 ratingsWills and Trusts Kit For Dummies Rating: 5 out of 5 stars5/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5Family Trusts: A Guide for Beneficiaries, Trustees, Trust Protectors, and Trust Creators Rating: 5 out of 5 stars5/5Win Your Case: How to Present, Persuade, and Prevail--Every Place, Every Time Rating: 5 out of 5 stars5/5Critical Race Theory: The Cutting Edge Rating: 4 out of 5 stars4/5Police State: Ten Secrets The Police Don't Want You To Know! (How To Survive Police Encounters!) Rating: 5 out of 5 stars5/5Trans: When Ideology Meets Reality Rating: 3 out of 5 stars3/5How to Think Like a Lawyer--and Why: A Common-Sense Guide to Everyday Dilemmas Rating: 4 out of 5 stars4/5
Reviews for Digital Earth
0 ratings0 reviews
Book preview
Digital Earth - Sarah Katz
Digital Earth
Cyber threats, privacy and ethics in an age of paranoia
Digital Earth
Cyber threats, privacy and ethics in an age of paranoia
SARAH KATZ
Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher and the author cannot accept responsibility for any errors or omissions, however caused. Any opinions expressed in this book are those of the author, not the publisher. Websites identified are for reference only, not endorsement, and any website visits are at the reader’s own risk. No responsibility for loss or damage occasioned to any person acting, or refraining from action, as a result of the material in this publication can be accepted by the publisher or the author.
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form, or by any means, with the prior permission in writing of the publisher or, in the case of reprographic reproduction, in accordance with the terms of licences issued by the Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should be sent to the publisher at the following address:
IT Governance Publishing Ltd
Unit 3, Clive Court
Bartholomew’s Walk
Cambridgeshire Business Park
Ely, Cambridgeshire
CB7 4EA
United Kingdom
www.itgovernancepublishing.co.uk
© Sarah Katz 2022
The author has asserted the rights of the author under the Copyright, Designs and Patents Act, 1988, to be identified as the author of this work.
First published in the United Kingdom in 2022 by IT Governance Publishing.
ISBN 978-1-78778-361-4
ABOUT THE AUTHOR
Sarah Katz is a graduate of UC Berkeley with a background in cybersecurity. She works as a technical writer at Microsoft®, and previously worked at NASA. Her writing has appeared in Cyber Defense Magazine, Dark Reading, Infosecurity Magazine, and Tech Xplore. Sarah has served as a cybersecurity speaker for the Brazilian technical institute IGTI, and is pursuing a PhD in cyberpsychology with a focus on user security in augmented reality. The short film Rationale – currently in production – based on her eponymous short story and published in Thriller Magazine, is about the risks of using mood-altering technology to enhance cognition.
ACKNOWLEDGEMENTS
I would like to thank Allen Joe who was my supervisor during my time at NASA, and who served as a main source of inspiration for this book.
I would also like to thank Yinka Akingbehin, Chris Evans, and Christopher Wright for reviewing this book during the production process.
CONTENTS
Introduction
Chapter one: The spike in phishing amid the COVID-19 pandemic
Key terms for this chapter
Chaos theory in cyber threat mitigation
The application of chaos theory to the assessment of phishing attacks
Chapter two: A glance at the history of phishing mitigation practices
The risk of phishing to federal health care agencies
Applications of chaos theory in cyber threat mitigation, including phishing attacks
Machine learning tools for phishing prevention
Persuasive factors used in phishing attacks
User awareness of email legitimacy verification techniques
Chapter three: The hard truth – How little many users understand about identifying malicious emails
Tackling email headers
Next steps: Computer-assisted threat detection
Chapter four: Disinformation versus misinformation in a post-COVID world
Global information sharing
Content moderators
How to spot misinformation
Managing content moderation: In theory and practice
Next steps: Head above water in cyberspace
Chapter five: Cyber terrorism and the firepower of social media
Why convey a message to the masses?
Making it look alluring
Using social media to attract and recruit
Next steps: Keep an eye on that friend request
Chapter six: Drones – A search and rescue solution or the all-seeing eye in the sky?
The technicalities of civilian privacy in UAV criminal investigation
San Jose as a case study
Those opposed
Those in favor
Calming the public outcry
Balancing technological surveillance measures with public interest
Next steps: Securing the wireless target
Recent developments
Chapter seven: Tying it all together
Appendix A: Bibliography
Further reading
INTRODUCTION
Information security concerns such as foreign meddling in politics, such as the 2016 US presidential election¹ and phishing campaigns that used the COVID-19 pandemic to intimidate victims into engaging with malicious email,² have made user security awareness a chief priority for the cybersecurity space. Whether it’s news of the next big ransomware attack or attackers turning to the Internet to commit terrorism, a multitude of threats have evolved. From phishing to political interference to cyber terrorism to police surveillance, issues of data and physical security as well as privacy continue to arise in the use of computers for both the individual user and large enterprise alike.
In fact, as many threat actors seek to attack the government infrastructure of powerful nations as well as the personal information of citizens, the United States federal and private health care sectors as well as users of social media and wireless devices have all become significant target risk groups.³ Although a wealth of research exists assessing the persuasive emotional methods used in phishing attacks, the tendency of users to fall victim to a variety of social engineering tactics might operate alongside the equally important factor of insufficient user awareness.
Given the increasing danger for both individuals and organizations, we must consider the various threats posed by online attacks across multiple spaces and from many different angles. Additionally, with technology an intrinsic part of our everyday lives, we need to be aware of digital threats, and be able to identify other threats such as phishing, ransomware, and spyware before they can wreak havoc in our professional or personal lives.
Throughout this book, we will discuss cyber threats such as phishing, disinformation versus misinformation in a post-COVID-19 world, cyber terrorism, and the power of social media, and ever-evolving privacy concerns in response to technological advances.
¹ 2016 Presidential Campaign Hacking Fast Facts.
CNN, October 28, 2020, https://edition.cnn.com/2016/12/26/us/2016-presidential-campaign-hacking-fast-facts/index.html
.
² Brumley, K. COVID-19 Scam Alerts.