Linked e-resources
Details
Table of Contents
Preface
Acknowledgements
Foreword
Organization
Book structure
1. Information Disorder
The new social ecosystem
Threat: disinformation campaign
Attacks
Vaccine hesitancy
Immigration
Climate change
Public naivety
Alleged political scandals
Countermeasures
Low-quality information
Fake-news detection and removal
Credibility
Spreading truth
Datasets
Malicious actors
Social bots
Fake profiles
Astroturf
Spammers
Sock puppets
Political memes
New directions
Part
Economy
State-sponsored Cryptocurrency
Threat: Collapse of the cryptocurrencies
Attacks and countermeasures
Hash Functions
Open Issues
Scenario 2: Trust in the Computational Power
Threat: New Technologies
Scenario 3: Infrastructure
Attacks and Countermeasures
Open Issues
Towards a State-Sponsored Cryptocurrency
Bitcoin Limitations
Develop a State-Sponsored Cryptocurrency
Scenario 1: Stock market forecasts
Threat: Information-based manipulation
A large attack surface
Attacks and countermeasures
Open issues and future directions
Threat: Trade-based manipulation
Attacks
Countermeasures
Open issues and future directions
Threat: Algorithm-based manipulation
Algorithms taking over
Loose cannons on the automation deck
Attacks
Countermeasures
Open issues and future directions
Other countermeasures
Threat: Technological bias, divide, and monopoly
Attacks and countermeasures
Open issues and future directions
Scenario 3: Remote stock market
Threat: Attacks against availability
Attacks and countermeasures
Threat: Work-from-home perils
Attacks
Countermeasures
Open issues and future directions
Scenario 4: Complex financial networks
Threat: Systemic risk and cascading failures
Measures of systemic risk
Economics and finance approaches
Network approaches
Countermeasures
Open issues and future directions. Part
Infrastructure
Critical Infrastructure
Scenario: Cyber Warfare targeting Critical Infrastructures
Threat: Malware
Attacks and Countermeasures
Open Issues and Future Directions
Scenario: A new Cyber-Physical threat from the sky
Threat: Drones
Attacks and Countermeasures
Open Issues and Future Directions
Attacks and countermeasures
Open issues and future directions
Threat: outsourcing of security
Attacks and countermeasures
Trust in the cloud
Security perimeter
Confidentiality
Integrity
Availability
Open issues and future directions
Technical side.
Acknowledgements
Foreword
Organization
Book structure
1. Information Disorder
The new social ecosystem
Threat: disinformation campaign
Attacks
Vaccine hesitancy
Immigration
Climate change
Public naivety
Alleged political scandals
Countermeasures
Low-quality information
Fake-news detection and removal
Credibility
Spreading truth
Datasets
Malicious actors
Social bots
Fake profiles
Astroturf
Spammers
Sock puppets
Political memes
New directions
Part
Economy
State-sponsored Cryptocurrency
Threat: Collapse of the cryptocurrencies
Attacks and countermeasures
Hash Functions
Open Issues
Scenario 2: Trust in the Computational Power
Threat: New Technologies
Scenario 3: Infrastructure
Attacks and Countermeasures
Open Issues
Towards a State-Sponsored Cryptocurrency
Bitcoin Limitations
Develop a State-Sponsored Cryptocurrency
Scenario 1: Stock market forecasts
Threat: Information-based manipulation
A large attack surface
Attacks and countermeasures
Open issues and future directions
Threat: Trade-based manipulation
Attacks
Countermeasures
Open issues and future directions
Threat: Algorithm-based manipulation
Algorithms taking over
Loose cannons on the automation deck
Attacks
Countermeasures
Open issues and future directions
Other countermeasures
Threat: Technological bias, divide, and monopoly
Attacks and countermeasures
Open issues and future directions
Scenario 3: Remote stock market
Threat: Attacks against availability
Attacks and countermeasures
Threat: Work-from-home perils
Attacks
Countermeasures
Open issues and future directions
Scenario 4: Complex financial networks
Threat: Systemic risk and cascading failures
Measures of systemic risk
Economics and finance approaches
Network approaches
Countermeasures
Open issues and future directions. Part
Infrastructure
Critical Infrastructure
Scenario: Cyber Warfare targeting Critical Infrastructures
Threat: Malware
Attacks and Countermeasures
Open Issues and Future Directions
Scenario: A new Cyber-Physical threat from the sky
Threat: Drones
Attacks and Countermeasures
Open Issues and Future Directions
Attacks and countermeasures
Open issues and future directions
Threat: outsourcing of security
Attacks and countermeasures
Trust in the cloud
Security perimeter
Confidentiality
Integrity
Availability
Open issues and future directions
Technical side.