We are IntechOpen, the world's leading publisher of Open Access books Built by scientists, for scientists

5,600+

Open access books available

137,000+

International authors and editors

170M+ Downloads

156 Countries delivered to Our authors are among the

Top 1% most cited scientists

12.2%

Contributors from top 500 universities

Selection of our books indexed in the Book Citation Index (BKCI) in Web of Science Core Collection™

## Interested in publishing with us? Contact book.department@intechopen.com

Numbers displayed above are based on latest data collected. For more information visit www.intechopen.com

## Meet the editor

Muhammad Sarfraz is a professor in the Department of Information Science, Kuwait University, Kuwait. His research interests include optimization, computer graphics, computer vision, image processing, machine learning, pattern recognition, soft computing, data science, and intelligent systems. Prof. Sarfraz has been a keynote/invited speaker at various platforms around the globe. He has advised/supervised more than 110 students for

their MSc and Ph.D. theses. He has published more than 400 publications as books, journal articles, and conference papers. He has authored and/or edited around seventy books. Prof. Sarfraz is a member of various professional societies. He is a chair and member of international advisory committees and organizing committees of numerous international conferences. He is also an editor and editor in chief for various international journals.

Contents

and Opportunities

*by Rebecca Parry*

*by Mohammed I. Alghamdi*

as a Cybersecurity Threat

the Missing Workforce Gap *by Borka Jerman Blažič*

*by Prasanta Kumar Sahoo*

*by Joshua Ojo Nehinbe*

*by Davi Alves*

*by Manfred Sneps-Sneppe*

in the Era of Psychocapitalism

*by Rodolfo Augusto Melo Ward de Oliveira*

**Preface XI**

**Chapter 1 1**

**Chapter 2 15**

**Chapter 3 27**

**Chapter 4 45**

**Chapter 5 57**

**Chapter 6 85**

**Chapter 7 99**

**Chapter 8 113**

Digital Forensics in Cyber Security—Recent Trends, Threats,

An Assessment of the Risk of Service Supplier Bankruptcies

Cybersecurity Skills in EU: New Educational Concept for Closing

A Model for Auditing Smart Intrusion Detection Systems (IDSs)

Digital Culture: Control and Domination of Technical Images

The Impact of Denial-of-Service Attack for Bitcoin Miners, Lisk Forgers, and a Mitigation Strategy for Lisk Forgers

On Telecommunications Thorn Path to the IP World:

From Cybersecurity to Artificial Intelligence

An Emerging Solution for Detection of Phishing Attacks

and Log Analyzers in Cyber Physical Systems (CPSs)

## Contents



Preface

Cyber threats and security are active and important areas of study, practice, and research today. This book compiles original and innovative findings on ethical, political, legal, and social issues relating to cyber security and threats. The ten chapters in this comprehensive reference explore the developments, methods, approaches, and surveys of cyber security and threats in a wide variety of fields and endeavors. It covers technical aspects as well as management, social, and government issues. The book has been compiled with views to provide researchers, practitioners, academicians, military professionals, government officials, and other industry professionals with an in-depth discussion of the latest advances in

Mohammed I. Alghamdi starts the book with Chapter 1, "Digital Forensics in Cyber Security—Recent Trends, Threats, and Opportunities" which examines the use of digital forensics in countering cybercrimes, a critical breakthrough in cybersecurity. The chapter analyzes the most recent trends in digital forensics, including cloud forensics, social media forensics, and the Internet of Things (IoT) forensics. The research presented relates to specific threats to digital forensics, including technical, operational, and personnel-related challenges. Additionally, the chapter examines the use of USB forensics, intrusion detection, and artificial intelligence as major opportunities for digital forensics that can make the processes easy, efficient,

Chapter 2, "An Assessment of the Risk of Service Supplier Bankruptcies as a Cybersecurity Threat" by Rebecca Parry, states that behind technology service suppliers lie companies that are subject to the risk of business failure due to market conditions and trading risks. Such failures could suddenly stop customers from accessing services or content, with potentially devastating business and personal impacts, given the rising importance of digital economies. The risk can be illustrated by reference to cloud computing insolvencies. This cybersecurity risk has barely been touched upon in the literature, since it lies at the intersection between law and computer science, both areas requiring high levels of specialist understanding. This

chapter is part of initial attempts to identify the threats presented.

In Chapter 3, "Cybersecurity Skills in EU: New Educational Concept for Closing the Missing Workforce Gap," Borka Jerman Blažič emphasizes that recruiting, retaining, and maintaining a validated number of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. This chapter presents and discusses the actions and developments in the education concept of cybersecurity knowledge and skills intended to meet the needs of the labor market in the European Union. It also presents and discusses changes in the education prepared by higher-education institutions and professional training

Chapter 4, "An Emerging Solution for Detection of Phishing Attacks," by Prasanta Kumar Sahoo discusses how more and more people are using the Internet to carry

the field.

and safe.

providers.
