{"id":91121,"date":"2020-06-23T09:38:37","date_gmt":"2020-06-23T13:38:37","guid":{"rendered":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/?p=91121"},"modified":"2024-07-29T12:20:05","modified_gmt":"2024-07-29T16:20:05","slug":"cyber-force","status":"publish","type":"post","link":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/2020\/06\/23\/cyber-force\/","title":{"rendered":"Cyber force"},"content":{"rendered":"<div id=\"attachment_91129\" style=\"width: 470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/webapp2.wright.edu\/web1\/newsroom\/2020\/06\/23\/cyber-force\/cyber-vikram-sethi-1-2\/\" rel=\"attachment wp-att-91129\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-91129\" class=\"size-large wp-image-91129\" src=\"https:\/\/webapp2.wright.edu\/web1\/newsroom\/files\/2020\/06\/Cyber-Vikram-Sethi-1-508x337.jpg\" alt=\"\" width=\"460\" height=\"305\" \/><\/a><p id=\"caption-attachment-91129\" class=\"wp-caption-text\">Vikram Sethi, a professor of information systems and supply chain management, authored \u201cCyber Weapons of Mass Psychological Destruction: And the People Who Use Them.\u201d<\/p><\/div>\n<p>A book that details the increasingly sinister trend in cybersecurity \u2014 from malware and hacking to cyber weapons \u2014 has been authored by Wright State University professor Vikram Sethi.<\/p>\n<p>\u201c<a href=\"https:\/\/www.amazon.com\/Cyber-Weapons-Mass-Psychological-Destruction-ebook\/dp\/B088PZV9NZ\/ref=sr_1_1?dchild=1&amp;keywords=vikram+sethi&amp;qid=1590151288&amp;sr=8-1\">Cyber Weapons of Mass Psychological Destruction: And the People Who Use Them,<\/a>\u201d published by Greylander Press, LLC, is available from Amazon.<\/p>\n<p>Sethi, a professor of <a href=\"https:\/\/business.wright.edu\/information-systems-and-supply-chain-management\">information systems and supply chain management<\/a>, spent three years researching and writing the book, which details cases of cyber intrusions between 1996 and 2018. Sethi says cyber weapons are a class of their own \u2014 anonymous, difficult to trace and hidden behind a shield of networks and servers.<\/p>\n<p>\u201cThis camouflage emboldens those who seek to do us harm,\u201d he said. \u201cIn this book, I trace this evolution to its current form, wherein sophisticated operatives use cyber tools to sow chaos, mistrust and confusion in society in order to slowly destabilize and divide us.\u201d<\/p>\n<p>Sethi said the most difficult part of writing the book was to look beyond individual cyber incidents and seek out patterns and trends in the growth of technologies and their purposes.<\/p>\n<p>\u201cTypically, when a cyber incident occurs, we all focus on what was taken\/ stolen\/compromised and what actions we should take to secure or guard the future,\u201d he said. \u201cTracing the trajectories across incidents and building fuller, more complete and explainable models to possibly anchor our thinking was a challenge.\u201d<\/p>\n<p>Sethi said the most gratifying part of writing the book was being able to explain the highly technical areas of cybersecurity in a simple manner understandable to a broad range of readers.<\/p>\n<p>\u201cMy guiding question was that of how can I focus a reader&#8217;s attention on what this means to\/for them?\u201d he said. \u201cHopefully, I have been able to do this.\u201d<\/p>\n<p>Sethi hopes his book helps people see that cyber weapons are being deployed against the population every day. On June 9, Honda Motor Co. reportedly suspended some of its auto and motorcycle production globally following a suspected cyber attack.<\/p>\n<p>\u201cThese weapons are sophisticated and appear in many forms \u2014 malware, spam, hackware, viruses, data breaches, social media campaigns, false narratives, a false sense of esteem by likes, retweets, etc., and by bringing out the worst in people,\u201d he said.<\/p>\n<p>However, Sethi said people can curb the damage from cyber weapons.<\/p>\n<p>\u201cSensible ways of controlling this damage stems from using security techniques, possessing and refining a questioning attitude, and adopting a steely discipline to recognize falsehoods,\u201d he said. &#8220;What is \u2018really real?\u2019 is difficult to answer, but beginning with this simple question is a strong enough start for most people.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In his new book, Vikram Sethi, a professor of information systems and supply chain management, examines the evolution of cyber attacks. <a href=\"https:\/\/webapp2.wright.edu\/web1\/newsroom\/2020\/06\/23\/cyber-force\/\" class=\"morelink\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":17,"featured_media":91129,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[722,748,725,715,18,4908],"tags":[],"class_list":["post-91121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-academics","category-business","category-home-news-sidebar","category-news","category-research","category-supply-chain-management-marketing-and-management"],"_links":{"self":[{"href":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/wp-json\/wp\/v2\/posts\/91121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/wp-json\/wp\/v2\/comments?post=91121"}],"version-history":[{"count":6,"href":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/wp-json\/wp\/v2\/posts\/91121\/revisions"}],"predecessor-version":[{"id":91217,"href":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/wp-json\/wp\/v2\/posts\/91121\/revisions\/91217"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/wp-json\/wp\/v2\/media\/91129"}],"wp:attachment":[{"href":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/wp-json\/wp\/v2\/media?parent=91121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/wp-json\/wp\/v2\/categories?post=91121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webapp2.wright.edu\/web1\/newsroom\/wp-json\/wp\/v2\/tags?post=91121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}