This book discusses a range of topics that are essential to understanding cyber security, including legal implications and technical aspects, cyber detection, and minimising the threats so that governments and organisations can function without noticeable degradation of service. Unlike other technological threats, cyber security threats have the potential to destroy governments and undermine democratic processes – which makes an overarching cyber security strategy essential for all functioning governments. Thus, the book serves as a guide for developing strategies and ideas in the field and as a motivator for other governments and interested parties to develop and implement effective strategies.
Arguably the most difficult aspect of these strategies is their implementation, which will require a cultural sea change in governments’ approaches to handling cyber security and developing a regulatory framework that links organisations and governments in a secure working environment. The development of cyber security strategies calls for new skills at the technical and user levels alike. However, IT skills are sometimes in short supply, and without a government policy on cyber security training, the lack of these skills could hamper the full potential of cyber security. The book explores various aspects and challenges of cyber security strategy and highlights the benefits and drawbacks, offering in-depth insights into the field.
विषयसूची
1. Cybersecurity Strategy.- 2. Artificial Intelligence Innovations.- 3. Cybersecurity and Healthcare.- 4. Artificial Intelligence Implementation.- 5. Emerging technologies to manage cybersecurity.- 6. Artificial Intelligence and Healthcare.- 7. Intelligent Decision making within cybersecurity.- 8. SDGs and CSR to embed cybersecurity in society.- 9. Cybersecurity leadership – ethical leadership.- 10. Government role and policies for cybersecurity – evaluation of the main governments approach.- 11. Countering cybersecurity threats.- 12. Impact case analysis of 2-3 cybersecurity cases.- 13. Cybersecurity governance.- 14. Legal perspective of cybersecurity laws.- 14. Cybersecurity and database integrity.- 15. Building international alliances in cybersecurity – political and regulatory requirements.- 16. Cybersecurity and behavioural changes.
लेखक के बारे में
Professor Hamid Jahankhani has taught at both the undergraduate and postgraduate levels, full and part-time and supervised and examined research students at the MPhil and Ph D levels and Doctorate in Professional Studies (DProf). Hamid’s teaching has covered a broad range of computing modules in particular information security management, information security risk and audit, digital forensics, systems design and development, telecommunications and networking, and computer systems. Hamid’s principal research area for a number of years has been in the field of information security management and digital forensics.
Dr. Gordon Bowen has a Doctorate in Business (University of Hull) and is a chartered marketer from the Chartered Institute of Marketing (UK). He is an associate professor in Management at Anglia Ruskin University and works as an associate lecturer at various universities and higher education institutions, including Warwick University, University of Gloucestershire, Northumbria University, Cumbria University, Regent’s University London, Ulster University, University of Hertfordshire, University of Wales Trinity St. David, and Grenoble Graduate Business School. His research interests are strategy, marketing, digital marketing, and SMEs, and he supervises Ph D and DBA students in these areas. Gordon has many completions at Ph D and DBA. Gordon has reviewed articles for journals and conferences including MDPI Sustainability, European Academy of Management Conference, and International Journal of Technology Management. He has published 5 edited books on social media and cybersecurity and AI, which are recognised internationally.
Dr. Saeed Sharif is the leader of Intelligent Technologies Research Group and a course leader for MSc Computer Science with Industrial Placement at the School of Architecture, Computing, and Engineering. He has a Ph D in artificial intelligence from Brunel University London. He is working closelypolicy makers nationally and internationally to improve the strategic systems. He has led the research development of different research projects associated with many industries. He has developed his research with the goal of improving the effectiveness, and efficiency of medical and health care systems. Dr. Saeed has published a significant number of research articles in highly reputable journals, international conferences, and book chapters, such as Elsevier Applied Soft Computing, Computer Methods and Programs in Biomedicine, IEEE Access, etc.
Osama Hussein is a security engineer and cybersecurity graduate student at Northumbria University. He holds an ISC^2 CC certificate and is an IBM AI Associate with a strong academic background in network engineering from the German University in Cairo. His research interests include post-quantum secure network protocols, information governance and cyber security, wireless network security, ethical hacking, and information assurance and risk management. As a security engineer, he has experience designing and implementing network security infrastructure, including VPN tunnels, ACLs, firewalls, intrusion prevention and detection systems, antivirus, and SIEM tools. He is skilled in device security hardening, internal and external routing, and site administration and has worked with Cisco and Forti Gate devices.