Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet29/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   25   26   27   28   29   30   31   32   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

25
 
Emerging threats
an open platform; see for instance the Wyplay developments, making the TV 
the heart of multi-media, gaming and other new digital services. Obviously, 
there is not yet a clear concern about the cyber security threats of the digital 
TV until it will be too late.
 2.
Modern living: Domotics (domestic robots) will take off soon. An increasing 
number of early adopters currently monitor and change temperature settings in 
their home or office remotely from their smart phone. This is just a first step 
in the remote management of the home. No one discusses the cyber security 
threats related to these functions.
 3.
Health sector: An increasing number of ICT-based systems are used to 
monitor the health of persons. Pacemakers and insulin pumps already have 
been hacked through their wireless interface. The designers did not take 
into account that hackers might be interested in manipulating such small 
systems. The wrong settings, however, may have a life-threatening effect 
(
Stigherrian, 2011
).
 4.
Soon, devices which monitor persons with a health problem on a 24/7 basis 
will be connected to the global grid with mobile and wireless technologies. 
If functionality goes first, manipulated data may cause all such patients 
automatically be phoned to report immediately at the hospital, or may cause 
wrong levels of medicines to be prescribed to patients.
 5.
Health monitoring and other medical equipment in hospitals is increasingly 
connected to the hospitals’ core network. As the protection of such networks 
may be weak for reasons discussed above, patients may be at risk. Impossible? 
In the Netherlands, a health monitoring system in a hospital emergency room 
was found to be a member of the Kazaa music sharing network. Thinking 
about cyber security seems to be discouraged near medical equipment. Is that 
because the cyber threat raises one’s pulse rate beyond healthy limits? Actually 
it is the unconsciously insecure phenomenon again.
 6.
Financial sector: Near Field Communication (NFC) chips provide a new form of 
identification and authentication for the holder of a smart phone. This forms the 
basis for contactless micro payments. It can be expected that cybercrime will take 
advance of the payment function by remote manipulation of the smart phone.
 7.
Transport sector: Modern cars and trucks contain an enormous amount of lines 
of code in its increasing number of electronic control units (ECU). According 
to 
TRB (2012)
, they are literally “computers on wheels.” The code modules 
monitor an increasing number of sensors and control and activate many 
actuators from brakes to windscreen wipers, from lights to collision avoidance 
systems. As many manufacturers develop modules, the interfaces between 
them need to be open. They presume a benign closed environment without 
hackers. However, if not already in your current car, network interfaces with 
public networks soon will provide automatic emergency call services such 
as Assist™ and eCall. Other services will follow which means that mobile 
data and mobile internet interfaces will open the car platform for two-way 
communication. Cybercrime will follow in due time.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   25   26   27   28   29   30   31   32   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish