Understanding Cyber Threats and Attacks


Bimal Kumar Mishra, PhD (Editor)
Principal, Markham College of Commerce, Hazaribag, Jharkhand, India

Jose R.C Piqueira, PhD (Editor)
Professor, Control Engineering, University of São Paulo, Brazil

Series: Safety and Risk in Society
BISAC: POL012000

In 1961, Leonard Kleinrock submitted to the MIT a PhD thesis entitled: “Information Flow in Large Communication Nets”1, an innovative idea for message exchanging procedures, based on the concept of post-office packet delivery procedures. It was the seed of ARPANET, a wide area data communication network, implemented in 1969, considered the origin of the Internet.

At the end of the 1970’s, digital transmission and packet-switching allowed the building of ISDN (Integrated Services Data Networks). Voice and data were integrated in the same network, given birth to electronic offices combining computation and communication technologies.
The electronic miniaturization and the popularization of micro-computers in the 1980’s, brought computer communication to home, allowing the integration and automation of many domestic tasks and access to some daily facilities from home.

A new technological breakthrough came in 1989, when Tim Berners-Lee, a British scientist working at the European Organization for Nuclear Research (CERN), conceived the world wide web (www), easing the communication between machines around the world2.

Nowadays, combining Kleinrock and Berners-Lee seminal ideas for network hardware and software, Internet became all pervasive in the daily life around the world, transforming the old telephone set into a small multipurpose computer.

Consequently, human life radically changed. Our dependence on computer networks became undeniable and together with it, harmful programs or malwares, developedtodamagemachinesortostealinformation, represent permanent threat toindividuals and society.

In computer science a new work research line emerged: cyber-security,which includes developing models, routines and software to protect machines and networks from malicious programs. This new discipline has attracted researchers to develop ideas for protecting people and corporations.

Cyber-security is the object of this book, that presents hints about how the community is working to manage these threats: Mathematical models based on epidemiology studies, Control of malwares and virus propagation, Protection of essential service plants to assure reliability, the direct impact of virus and malwares over human activities and behavior, Government entities which are highly concerned with the necessary preventive actions.

As cyber-security is a new and wide subject, the intention was to give a general idea of some points, leaving to the readers the task to go ahead.



Table of Contents


Chapter 1. Cyber Threats for the Oil and Gas Sector in an Age of Connected Production
(Antônio Carlos Bastos de Godói, Research Centre for Gas Innovation, University of São Paulo, São Paulo, SP, Brazil)

Chapter 2. Exploring the Delayed and Optimally Controlled Dynamics of Malicious Objects in Computer Network
(Sangeeta Kumari and Ranjit Kumar Upadhyay, Department of Mathematics and Computing, Indian Institute of Technology [Indian School of Mines], Dhanbad, Dhanbad, Jharkhand, India)

Chapter 3. Cyber Threats and Attacks in Smart Energy Networks
(Zoya Pourmirza and Sara Walker, School of Engineering, Newcastle University, Newcastle, UK)

Chapter 4. A Twofold Mathematical Model to Study the Malware Attack of Compromised IoT Botnet on Targeted Networks
(Ajit Kumar Keshri, Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi, Jharkhand, India)

Chapter 5. A Survey on Compartmental Models in Computer Viruses
(Cristiane M. Batistela and Manuel A. M. Cabrera, Escola Politécnica da Universidade de São Paulo, São Paulo, SP, Brasil)

Chapter 6. Rethinking Cybersecurity as a Group Phenomenon: Impact of Shared Mental Models on Cybersecurity Decisions within Communities of Practice
(Susan Squires, PhD, and Jamie Johnson, PhD, Department of Anthropology, University of North Texas, Denton, Texas, US)

Chapter 7. Auditing National Cybersecurity Strategies in Order to Protect Nation-States’ Cyber Assets
(Regner Sabillon, Internet Interdisciplinary Institute [IN3], Universitat Oberta de Catalunya, Barcelona, Spain)

Chapter 8. Effect of Vaccination on the Attack of Malicious Objects in Wireless Network
(MaltiKumaria, Binay Kumar Mishra, R. N. Sinha, Research Scholar, Department of Computer Applications, Vinoba Bhave University, Hazaribagh, Jharkhand, India, and others)

Chapter 9. Mathematical Model on Cyberattack Behavior in E-Commerce
(Binay Kumar Mishra and Santosh Kumar Srivastava, Department of Physics, Veer Kunwar Singh University, Ara, Bihar, India, and others)

Chapter 10. Understanding Cyber Threats and Cyber Attacks on Satellites
(Jyoti Kumari Gupta and Dinesh Kumar Saini, Research Scholar, Department of Computer Applications, Vinoba Bhave University, Hazaribag, India, and others)


Additional information