Jump to ContentJump to Main Navigation
Advances in Cyber SecurityTechnology, Operations, and Experiences$
Users without a subscription are not able to see the full content.

D. Frank Hsu and Dorothy Marinucci

Print publication date: 2013

Print ISBN-13: 9780823244560

Published to Fordham Scholarship Online: September 2015

DOI: 10.5422/fordham/9780823244560.001.0001

Show Summary Details
Page of

PRINTED FROM FORDHAM SCHOLARSHIP ONLINE (www.fordham.universitypressscholarship.com). (c) Copyright Fordham University Press, 2022. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in FSO for personal use.date: 23 May 2022

The Evolving Consumer Online Threat Landscape

The Evolving Consumer Online Threat Landscape

Creating an Effective Response

(p.139) The Evolving Consumer Online Threat Landscape
Advances in Cyber Security

Adam Palmer

Fordham University Press

The proliferation of Internet-connected devices in the consumer market has created a dramatic shift from a single point PC-based threat risk to an expanded threat perimeter that includes tablet devices, smartphones, and Internet-connected televisions. Consumer home network growth now requires security for a consumer's entire digital lifestyle and not just a single-point stationary device. The difficulty of securing this expanded threat landscape is exacerbated by the rise of unique attacks that sometimes render traditional antivirus strategies ineffective. This chapter discusses solutions to the expanding cyber threat landscape, including improved reputation-based threat detection, effective public-private collaboration, and increased user responsibility within the digital ecosystem.

Keywords:   cyber security, Internet, consumer home network, cyber threats, threat detection, public-private collaboration, user responsibility

Fordham Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .