Preface

The multi-billion-dollar information and communication technologies (ICT) security market is one of the fastest growing in the world. The ICT security field is a highly complex cross-disciplinary domain that includes computer science, management science, software engineering, information systems, network management, policy making, and management of infrastructures.

ICT security is becoming increasingly important for global business and for society in general. ICT is having an ever-increasing impact upon many aspects of our lives, bringing with it a growing reliance upon ICT networks, data, and services. This reliance makes the protection and security of ICT assets critical. However, as the rapid evolution of technical innovation brings increased complexity of systems and networks, effectively securing ICT assets is becoming ever more challenging. Society’s dependence on ICT infrastructure has made it vulnerable to individuals, organizations, and others who may seek to exploit this dependency to further their own interests, be that for financial or political gain.

These ICT vulnerabilities can be considered threats to national security and can have a profound impact upon individuals, communities, businesses, and societies. The task of preventing, mitigating, and supporting resilience in the face of such threats remains a major role for nation-states.

To effectively protect society and reduce these vulnerabilities, ICT security is required to be innovative and dynamic in its approach. It needs to anticipate, detect, deter, and respond to all levels of threats while simultaneously operating in line with current legal, governance, regulatory, and ethical frameworks.

This book is a compilation of chapters that address emergent topics related to ICT and security from both theoretical and applied perspectives. It is arranged into five parts. Part 1 addresses a range of current topics around information and systems security, Part 2 focuses on network and infrastructure security, Part 3 takes a look at mobile and cloud computing security, Part 4 discusses cyber-crime and cyber-terrorism, and Part 5 addresses online radicalization and online financial crime.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset