This book addresses the pertinent issues that will need to be considered by those interested in physical security problems of the future. Specifically, it examines how changes in the accessibility of technology – data, hardware, software – are likely to affect both threat and mitigation considerations for Chemical, Biological, Radiological and Explosive (CBRE) scenarios and how social science can inform us of the human aspects of each. The trend towards an ever more socio-technical society and infrastructures – encapsulated by concepts such as 'smart cities' – is drawn out as a key...
This book addresses the pertinent issues that will need to be considered by those interested in physical security problems of the future. Specifically...
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. The ongoing pandemic has created a new level of threats which presents new challenges around privacy, data protection, malicious application, unprotected networks or networks with basic protection that are being used as a gateway to larger...
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and ad...
This book explains Europol’s online sharing platforms efforts in three major cybercrime areas: ransomware, money laundering with cryptocurrencies, and online child sexual exploitation that Europol has already pushed private and public actors to cooperate.Since the global financial crisis, online sharing economy platforms have made a significant impact on use of under-utilized resources. People who have a car (Uber) or a spare room (Airbnb) began to share their under-used assets with others for extra income. The success achieved by these online platforms that enable efficient use of limited...
This book explains Europol’s online sharing platforms efforts in three major cybercrime areas: ransomware, money laundering with cryptocurrencies, a...
This book intersects the distributed ledger technology (DLT) community with the international security community. Given the increasing application of blockchain technology in the fields of business and international development, there is a growing body of study on other use cases. For instance, can blockchain have a significant role in preserving and improving international security? This book explores this question in the context of preventing the proliferation of some of the most dangerous materials in the world—items that if not secured can lend to the development of weapons of mass...
This book intersects the distributed ledger technology (DLT) community with the international security community. Given the increasing application of ...
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods. Special attention is given to those approaches and technologies that unleash the power of collaboration among stakeholders, in a field based often developed in isolation and segregation of information.Given the pervasively growing dependency of society on IT technology, and the corresponding proliferation of cyber-threats, there is both an imperative need...
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective ...
This book addresses ways that governments, international organizations, and other stakeholders can utilize data to uncover illicit trade in materials and equipment that could be used to support chemical, biological, nuclear, and advanced conventional weapons systems. Key concepts of strategic trade are introduced, including examples of strategic goods and their potential uses in weapons of mass destruction (WMDs) and weapons systems, the interplay between the Harmonized System and strategic trade control regimes, and the data available for analysis in the field. Innovative, yet practical...
This book addresses ways that governments, international organizations, and other stakeholders can utilize data to uncover illicit trade in materials ...