As our reliance on digital technology increases, so do the risks associated with cybersecurity. For students and faculty at The UWI St Augustine Campus, understanding these risks and learning how to mitigate them is essential. This blog post will explore the importance of cybersecurity, provide practical tips, and highlight resources available at the Alma Jordan Library to help you stay safe online.
Why Cybersecurity Matters?
Cybersecurity is critical because our personal and professional lives are increasingly intertwined with digital technologies. According to Craigen, Diakun-Thibault, and Purse (2014), cybersecurity encompasses the protection of cyberspace and cyberspace-enabled systems from occurrences that misalign legal and actual property rights. This definition underscores the multidimensional nature of cybersecurity, which includes technical, organizational, economic, social, and political aspects.
Common Cyber Threats
Phishing Attacks: These attacks often involve fraudulent emails that appear to be from legitimate sources. The goal is to trick recipients into providing sensitive information, such as passwords or credit card numbers. For example, a student might receive an email that looks like it’s from their university, asking them to reset their password, only to have their information stolen.
Malware: Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems. This can include viruses, worms, and Trojan horses.
Ransomware: A type of malware that locks users out of their systems or data, demanding a ransom to restore access. Hospitals, for instance, have been targeted, putting patients at risk.
Social Engineering: This tactic involves manipulating individuals into breaking normal security procedures, often by tricking them into giving away confidential information.
Tips for Enhancing Cybersecurity Awareness
Use Strong Passwords: Create complex passwords that include a mix of letters, numbers, and symbols. Avoid using easily guessable information, such as birthdays or common words.
Enable Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring additional verification beyond just a password.
Stay Informed About Phishing Scams: Be cautious of unsolicited emails or messages asking for personal information. Verify the source before clicking on any links or providing information.
Regularly Update Software: Keep your operating systems and applications up to date to protect against the latest vulnerabilities.
Be Mindful of Your Online Presence: Limit the amount of personal information shared online and adjust privacy settings on social media platforms.
Selected E-books
Understanding and practising good cybersecurity habits is essential for protecting yourself and the university community. You can enhance your cybersecurity awareness and resilience by staying informed about the latest threats and utilizing the resources available at the Alma Jordan Library. Discover our selected e-books on cybersecurity below, and don't forget to explore the library's catalogue and databases for even more insightful e-books and journals on this crucial topic.
Artificial intelligence and cybersecurity are two emerging fields that have made phenomenal contributions toward technological advancement. As cyber-attacks increase, there is a need to identify threats and thwart attacks. This book incorporates recent developments that artificial intelligence brings to the cybersecurity world. Artificial Intelligence and Cybersecurity: Advances and Innovations provides advanced system implementation for Smart Cities using artificial intelligence. It addresses the complete functional framework workflow and explores basic and high-level concepts. The book is based on the latest technologies covering major challenges, issues and advances, and discusses intelligent data management and automated systems. This edited book provides a premier interdisciplinary platform for researchers, practitioners and educators. It presents and discusses the most recent innovations, trends and concerns as well as practical challenges and solutions adopted in the fields of artificial intelligence and cybersecurity.
Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens. Today's current cyber security systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and artificial intelligence. The book describes the author's research and development of cyber-immunity systems that will prevent the destruction of critical information infrastructure by future unknown cyber-attacks and thus avoid the significant or catastrophic consequences of such attacks. The book is designed for undergraduate and post-graduate students, for engineers in related fields as well as managers of corporate and state structures, chief information officers (CIO), chief information security officers (CISO), architects, and research engineers in the field of cybersecurity.
Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to information technology law - the law affecting information and communication technology (ICT) - in Jamaica covers every aspect of the subject, including the regulation of digital markets, intellectual property rights in the digital context, relevant competition rules, drafting and negotiating ICT-related contracts, electronic transactions, and cybercrime. Lawyers who handle transnational matters will appreciate the detailed explanation of specific characteristics of practice and procedure. Following a general introduction, the monograph assembles its information and guidance in six main areas of practice: (1) the regulatory framework of digital markets, including legal aspects of standardization, international private law applied to the online context, telecommunications law, regulation of audio-visual services and online commercial platforms; (2) online public services including e-government, e-health and online voting; (3) contract law with regard to software, hardware, networks and related services, with special attention to case law in this area, rules with regard to electronic evidence, regulation of electronic signatures, online financial services and electronic commerce; (4) software protection, legal protection of databases or chips, and other intellectual property matters; (5) the legal framework regarding cybersecurity and (6) the application of criminal procedure and substantive criminal law in the area of cybercrime. Its succinct yet scholarly nature, as well as the practical quality of the information it provides, make this monograph a valuable time-saving tool for business and legal professionals alike. Lawyers representing parties with interests in Jamaica will welcome this very useful guide, and academics and researchers will appreciate its value in the study of comparative law in this relatively new and challenging field.
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. The volume is split into four thematic sections: Concepts and frameworks; Challenges to secure and peaceful cyberspace; National and regional perspectives on cybersecurity; Global approaches to cybersecurity. This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general.
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens' privacy while keeping usability levels.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world.nbsp;Offering practical guidance for addressing contemporary risks, the book is organized into three sections: Global Trends--considers international e-government trends, includes case studies of common cyber threats and presents efforts of the premier global institution in the field National and Local Policy Approaches--examines the current policy environment in the United States and Europe and illustrates challenges at all levels of government Practical Considerations--explains how to prepare for cyber attacks, including an overview of relevant U.S. Federal cyber incident response policies, an organizational framework for assessing risk, and emerging trends Also suitable for classroom use, this book will help you understand the threats facing your organization and the issues to consider when thinking about cybersecurity from a policy perspective.
Students and faculty are invited to visit the Alma Jordan Library to view our informative display on cybersecurity and explore the selection of featured books on this topic.
Cybersecurity Awareness Course
The UWI's Centre for Information Technology Services (CITS) provides a Cybersecurity Awareness Course tailored to enhance the security awareness of both faculty and students. This programme aims to educate participants on the recommended methods for maintaining safety and safeguarding institutional information. The curriculum covers topics, including identifying phishing scams, securing devices, creating robust passwords and understanding the potential risks associated with social media and internet usage. By completing this course, faculty and students will be better prepared to defend against cyber threats and contribute to establishing a digital environment at UWI. For more information on this course, visit; https://sta.uwi.edu/cits/cybersecurity-awareness-course
References
Alharbi, Talal, and Asifa Tassaddiq. 2021. "Assessment of Cybersecurity Awareness among Students of Majmaah University." Big Data and Cognitive Computing 5 (2): 23.
Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. 2014. "Defining Cybersecurity." Technology innovation management review 4 (10).
Florackis, Chris, Christodoulos Louca, Roni Michaely, and Michael Weber. 2023. "Cybersecurity Risk." The Review of Financial Studies 36 (1): 351-407.
Peker, Yesem Kurt, Lydia Ray, Stephanie Da Silva, Nathaniel Gibson, and Christopher Lamberson. "Raising Cybersecurity Awareness among College Students." 2016.
As our reliance on digital technology increases, so do the risks associated with cybersecurity. For students and faculty at The UWI St Augustine Campus, understanding these risks and learning how to mitigate them is essential. This blog post will explore the importance of cybersecurity, provide practical tips, and highlight resources available at the Alma Jordan Library to help you stay safe online.
Why Cybersecurity Matters?
Cybersecurity is critical because our personal and professional lives are increasingly intertwined with digital technologies. According to Craigen, Diakun-Thibault, and Purse (2014), cybersecurity encompasses the protection of cyberspace and cyberspace-enabled systems from occurrences that misalign legal and actual property rights. This definition underscores the multidimensional nature of cybersecurity, which includes technical, organizational, economic, social, and political aspects.
Common Cyber Threats
Phishing Attacks: These attacks often involve fraudulent emails that appear to be from legitimate sources. The goal is to trick recipients into providing sensitive information, such as passwords or credit card numbers. For example, a student might receive an email that looks like it’s from their university, asking them to reset their password, only to have their information stolen.
Tips for Enhancing Cybersecurity Awareness
Selected E-books
Understanding and practising good cybersecurity habits is essential for protecting yourself and the university community. You can enhance your cybersecurity awareness and resilience by staying informed about the latest threats and utilizing the resources available at the Alma Jordan Library. Discover our selected e-books on cybersecurity below, and don't forget to explore the library's catalogue and databases for even more insightful e-books and journals on this crucial topic.
Cybersecurity Awareness Course
The UWI's Centre for Information Technology Services (CITS) provides a Cybersecurity Awareness Course tailored to enhance the security awareness of both faculty and students. This programme aims to educate participants on the recommended methods for maintaining safety and safeguarding institutional information. The curriculum covers topics, including identifying phishing scams, securing devices, creating robust passwords and understanding the potential risks associated with social media and internet usage. By completing this course, faculty and students will be better prepared to defend against cyber threats and contribute to establishing a digital environment at UWI. For more information on this course, visit; https://sta.uwi.edu/cits/cybersecurity-awareness-course
References
Alharbi, Talal, and Asifa Tassaddiq. 2021. "Assessment of Cybersecurity Awareness among Students of Majmaah University." Big Data and Cognitive Computing 5 (2): 23.
Craigen, Dan, Nadia Diakun-Thibault, and Randy Purse. 2014. "Defining Cybersecurity." Technology innovation management review 4 (10).
Florackis, Chris, Christodoulos Louca, Roni Michaely, and Michael Weber. 2023. "Cybersecurity Risk." The Review of Financial Studies 36 (1): 351-407.
Peker, Yesem Kurt, Lydia Ray, Stephanie Da Silva, Nathaniel Gibson, and Christopher Lamberson. "Raising Cybersecurity Awareness among College Students." 2016.