Open Access Publisher and Free Library
03-crime prevention.jpg

CRIME PREVENTION

CRIME PREVENTION-POLICING-CRIME REDUCTION-POLITICS

Posts tagged Cyber Threats
IT Outage from CrowdStrike's Update: Impacts to Certain Public Safety Systems and Considerations for Congress

Pechtol, Colby; Gallagher, Jill C.

The following passage from the document contains multiple links embedded in the text: "On July 19, 2024, CrowdStrike, a U.S. cybersecurity firm, released a software update to their customers. The update caused certain systems to crash, disrupting services across several industries, including airlines, banks, hospitals, government agencies, and public safety systems. CrowdStrike reported that the incident was caused by 'a defect found in a single content update of its software on Microsoft Windows operating systems' and was not a cyberattack. Though the update affected less than 1% of all Windows machines, the impacts were widespread and global. The incident illustrates the vulnerabilities of information technology (IT) systems, increased dependence and risks in relying on third-party vendors for critical IT services, and lack of protocols and backup systems in the event of IT system failures. This In Focus discusses the incident's impact on certain U.S. public safety communications systems and services."

LIBRARY OF CONGRESS. CONGRESSIONAL RESEARCH SERVICE. 26 JUL, 2024.. 3p.

Cybersecurity of the Civil Nuclear Sector: Threat Landscape and International Legal Protections in Peacetime and Conflict

DIAS, TALITA DE SOUZA; HAKMEH, JOYCE; MESSMER, MARION

From the document: "Many states are becoming more interested in nuclear energy as a means to help achieve environmental goals, economic development and energy security. A declaration by 25 countries - including the US, the UK and Canada - during the COP28 UN [28th Conference of Parties to the United Nations] Climate Change Conference in December 2023 exemplified this trend, announcing an ambition to triple nuclear energy capacity by 2050 as part of efforts to achieve net zero greenhouse gas emissions and limit global warming. The commitment emphasized not only the potential role of nuclear energy in supporting sustainable development but also the consequent importance of maintaining safety, sustainability, security and non-proliferation standards in the civil nuclear industry. As growth in the use of nuclear energy would imply that more nuclear power plants will come into operation, considerations of safety and security in the civil nuclear industry - including around cybersecurity, the specific subject of this paper - are likely to become more critical than ever. Since Russia's full-scale invasion of Ukraine in February 2022, there has been a notable shift in many Western countries' energy security strategies. [...] This surge in interest can be attributed in part to nuclear energy's reliability, resilience and low carbon footprint. [...] However, any expansion of nuclear capabilities also brings new challenges, particularly in cybersecurity. Cyber operations targeting civil nuclear systems have been reported worldwide. Such operations pose significant risks, with potential harms including information theft, equipment malfunction, disruption of energy supplies, environmental damage and health impacts. The risks are prevalent both in peacetime and during conflicts."

ROYAL INSTITUTE OF INTERNATIONAL AFFAIRS. JUL, 2024.

Optimizing Cyberdeterrence

By Robert Mandel

Optimizing Cyberdeterrence by Robert Mandel provides a comprehensive analysis of strategies to enhance cybersecurity on a global scale. Mandel delves into the concept of cyberdeterrence and how it can be optimized to prevent cyberattacks effectively. Through detailed case studies and theoretical frameworks, the book offers valuable insights into the evolving landscape of cyber threats and the necessary steps to mitigate them. A must-read for policymakers, cybersecurity professionals, and anyone interested in safeguarding against cyber risks.

Georgetown University Press, 2017 - 287 pages

Cyberstalking Harassment in the Internet Age and How to Protect Your Family

MAY CONTAIN MARKUP

PAUL BoCIJ

INTRODUCTION; “We are constantly told that technology enriches our lives: the Internet provides learning opportunities for our children, cell phones allow us to keep in touch with our relatives while we're on the move, and laptop computers allow us to work almost anywhere at any time. But we are also constantly warned about the dangers of technology, especially the Internet: hackers can steal our credit card numbers, pedophiles can target our children, and racists can spread messages of hate. We take these dangers seriously because technology permeates almost every aspect of our lives. For instance, it is not an exaggeration to sugges t that virtually every child in the United States, Europe, and any number of other technically advanced nations will come into regular contact with the Internet. It is for this reason that parents, teachers, law enforcement agencies, and others constantly monitor the safety of th e young people in their care.”

Praeger. Westport, Connecticut London. 2004. 273p.

Computer Fraud and Countermeasures

MAY CONTAIN MARKUP

By LEONARD I. KRAUSS and AILEEN MACGAHAN

FROM THE PREFACE: “This book deals with computer fraud prevention, detection, deterrents, investigation, loss recovery, and risk management. (The term "computer fraud" is our shorthand way of referring to computerassisted or computer-related crimes. The people who commit these crimes may use the computer either directly or as a vehicle for deliberate misrepresentation or deception, usually to cover up the embezzlement or theft of money, goods, services, or information.) Avoiding the sensationalism that so often characterizes the current literature on the subject, this book is addressed to business executives, financial and administrative officers, data processing managers, systems analysts, auditors, corporate and computer security supervisors, law enforcement investigators, and others who are responsible for providing direction in coping with the risk of computer fraud.”

RENTICE-HALL, INC., Englewood Cliffs, New Jersey. 1979. 502p.