Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

Chapter 5Cyberwar is Coming

T. Manikandan1, B. Balamurugan2, C. Senthilkumar1, R. Rajesh Alias Harinarayan3, R. Raja Subramanian3

1 APCSE, CSE Department, Thiagarajar College of Engineering, Madurai, Tamil Nadu, India

2 PCSE, Galgotias University, Uttar Pradesh, India

3 Research Scholar, CSE Department, Thiagarajar College of Engineering, Madurai, Tamil Nadu, India

Email: tmcse@tce.edu

Abstract

“War” is the most dangerous game played by humans when their resources are threat, which has then continuously evolved throughout history due to greed. After the huge losses incurred in the world wars, humanity was restored with diplomacy. War is initiated when emotions like fear and greed encroach upon the minds of people in a society. Basically, fear is triggered due to the lack of resources necessary for living a peaceful life, and questions begin to arise in the minds of people as to what would happen if these resources were to be threatened by those of a faster-growing society with more money and arms which might be used to enslave their own society. Greed happens after a nation reaches a stable state and wants to to become. Armed warfare in today’s world has been reduced due to diplomatic efforts, but the fear of reduced resources and greed for money are still visible, and the resources are now becoming digital all over the world with the development of technologies like 5G, the internet of things, smartphones, smarter cities, etc., but so are cyberattacks with ransomware such as ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book