IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Death by Hacking: The Emerging Threat of Kinetic Cyber

Death by Hacking: The Emerging Threat of Kinetic Cyber
View Sample PDF
Author(s): Penelope Wang (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore)
Copyright: 2016
Pages: 17
Source title: Combating Violent Extremism and Radicalization in the Digital Era
Source Author(s)/Editor(s): Majeed Khader (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore), Loo Seng Neo (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore), Gabriel Ong (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore), Eunice Tan Mingyi (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore)and Jeffery Chin (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore)
DOI: 10.4018/978-1-5225-0156-5.ch022

Purchase

View Death by Hacking: The Emerging Threat of Kinetic Cyber on the publisher's website for pricing and purchasing information.

Abstract

Innovation and technological advancements have seen many devices and systems being linked up on to the Internet. Such devices and systems include personal medical devices like insulin pumps and pacemakers, cars, as well as critical infrastructure like power grids and traffic light systems. However, recent research by cyber security experts has revealed that these critical devices and systems are highly vulnerable to being hacked into and manipulated. Should such an attack be carried out successfully by bad actors, like violent extremists, this could result in physical injury or even death. Hence, this chapter aims to bring awareness on the kinetic cyber threat by highlighting various forms of kinetic cyber, and the vulnerabilities that make these devices and systems susceptible. In addition, this chapter introduces the motivations and characteristics of violent extremists who might engage in kinetic cyber, and ends off by proposing some recommended directions to counter this threat.

Related Content

N. L. Swathi, Achukutla Kumar. © 2024. 17 pages.
Gurwinder Singh, Anshika Thakur. © 2024. 21 pages.
Ashok Singh Gaur, Hari Om Sharan, Rajeev Kumar. © 2024. 16 pages.
Sabyasachi Pramanik. © 2024. 17 pages.
Geetha Manoharan, Abdul Razak, C. V. Guru Rao, Sunitha Purushottam Ashtikar, M. Nivedha. © 2024. 28 pages.
Roop Kamal, Manpreet Kaur, Jaspreet Kaur, Shivani Malhan. © 2024. 10 pages.
Anu Sharma. © 2024. 8 pages.
Body Bottom