Abstract : The dynamic panorama of cyber dangers is examined in Chapter 7, "Protecting Digital Fortresses: Cyber Security and Digital Privacy in the 21st Century," along with the measures used to protect our digital life. The chapter explores the emergence of cyber dangers and changing attack vectors while navigating key defense strategies like cyber hygiene, encryption, and AI-driven security. It explores the conundrum of digital privacy in the era of big data, the Internet of Things, and social media while illuminating governing policies and cutting-edge innovations like quantum-safe cryptography. The chapter ends by imagining the future and highlighting ethical issues and global cooperation as the cornerstones in defending our digital fortresses against the constantly changing danger scenario.
Keywords : Cybersecurity, Digital Privacy, Cyber Threats, Phishing, Malware, Cyber Hygiene, Encryption, Multi-Factor Authentication, AI-Powered Security, Social Media Privacy, Data Protection, Online Security, Digital Fortresses, Ethical Hacking, Data Encryption, Di
Cite : Nafees, M., & Gouri, M. H. (2023). Protecting Digital Fortresses: Cyber Security And Digital Privacy In The 21st Century (1st ed., p. 116). Noble Science Press. https://doi.org/10.52458/9789388996747.nsp2023.eb.ch-15
References :
Schneier, Bruce. "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World." W. W. Norton & Company, 2015.
Anderson, Ross. "Security Engineering: A Guide to Building Dependable Distributed Systems." Wiley, 2020.
Rouse, Margaret. "What is Cybersecurity? - Definition from WhatIs.com." TechTarget, 2018.
Goodman, Marc, et al. "The Global Cybersecurity Index." International Telecommunication Union (ITU), 2017.
Dye, James E., et al. "Introduction to Computer Security." Pearson, 2017.
Greenwald, Glenn. "No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State." Picador, 2014.
Winkler, Ira. "Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies." Syngress, 2017.
Cavelty, Myriam Dunn. "Cyber-Security and Threat Politics: US Efforts to Secure the Information Age." Routledge, 2007.
Clarke, Richard A., and Knake, Robert K. "Cyber War: The Next Threat to National Security and What to Do About It." Ecco, 2010.
Warner, Richard. "Cybersecurity and Cyberwar: What Everyone Needs to Know." Oxford University Press, 2014.
Molloy, Iain. "Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security." No Starch Press, 2017.
Walden, Ian. "Computer and Information Security Handbook." Morgan Kaufmann, 2017.
Nye, Joseph S. "The Future of Power." Public Affairs, 2011.
McGregor, Richard A. "The Party: The Secret World of China's Communist Rulers." HarperCollins, 2010.
Singer, Peter W., and Friedman, Allan. "Cybersecurity: What Everyone Needs to Know." Oxford University Press, 2014.