  {"id":356,"date":"2023-05-11T09:23:37","date_gmt":"2023-05-11T13:23:37","guid":{"rendered":"https:\/\/www.yorku.ca\/laps\/research\/bcccdev\/?page_id=356"},"modified":"2025-10-07T10:05:11","modified_gmt":"2025-10-07T14:05:11","slug":"ucs-blogs","status":"publish","type":"page","link":"https:\/\/www.yorku.ca\/research\/bccc\/ucs-blogs\/","title":{"rendered":"Online Blogs"},"content":{"rendered":"\n<p>As part of the <strong>Understanding Cybersecurity Series (UCS)<\/strong> program at BCCC, we plan to create non-technical materials in addition to academic articles, book chapters, and books. These materials will cater to a broad audience, including youth, seniors, laypeople, and the general public. <span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\">We will disseminate relevant findings to the public through digital social communication channels like LinkedIn, Twitter, and publication blogs, recognizing that knowledge dissemination is essential to<\/span>&nbsp;<strong>Cyber Threat Intelligence (CTI)<\/strong>. By sharing threat insights in accessible formats, we raise public awareness and strengthen cybersecurity literacy across all levels of society.<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Our Blogs<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/the-tech-trend.com\/security\/understanding-ai-security-and-privacy\/\">Understanding AI in Cybersecurity and AI Security: AI Security and Privacy (UCSAISec-03)<\/a><\/h2>\n\n\n\n<p>AI is revolutionizing every industry it touches, but its growing integration into critical systems also opens new security vulnerabilities. As machine learning models become more sophisticated, they attract attackers who aim to exploit their design, data, and functionality.<\/p>\n\n\n\n<p>2025<\/p>\n\n\n\n<p><a href=\"http:\/\/www.ahlashkari.com\/PDFs\/Understanding%20AI%20in%20Cybersecurity%20and%20AI%20Security_%20AI%20Security%20and%20Privacy%20(UCSAISec-03).pdf\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/the-tech-trend.com\/security\/understanding-ai-security-and-privacy\/\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/the-tech-trend.com\/security\/understanding-ai-in-cybersecurity-and-ai-security\/\">Understanding AI in Cybersecurity and AI Security: Defense Methods for Adversarial Attacks and Privacy Issues in Secure AI (UCSAISec-04)<\/a><\/h2>\n\n\n\n<p>As AI systems become more common in the real world, powering self-driving cars, medical tools, and surveillance, they\u2019ve also become exposed to new kinds of threats. One serious threat is the adversarial attack,&nbsp;...<\/p>\n\n\n\n<p>2025<\/p>\n\n\n\n<p><a href=\"http:\/\/www.ahlashkari.com\/PDFs\/Understanding%20AI%20in%20Cybersecurity%20and%20AI%20Security%20(UCSAISec)_%20Defense%20Methods%20for%20Adversarial%20Attacks%20and%20Privacy%20Issues%20in%20Secure%20AI%20(Article%204).pdf\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/the-tech-trend.com\/security\/understanding-ai-in-cybersecurity-and-ai-security\/\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/the-tech-trend.com\/security\/understanding-ai-in-cybersecurity-and-ai-security\/\">U<\/a><a href=\"https:\/\/the-tech-trend.com\/security\/ai-safety-and-fairness\/\">nderstanding AI in Cybersecurity and AI Security: AI Safety and Fairness Nowadays:<br>Explained (UCSAISec-05)<\/a><\/h2>\n\n\n\n<p>As AI technologies advance at an unprecedented speed, their societal risks are becoming as visible as their benefits. Policymakers and researchers now rank AI safety concerns alongside global-scale threats, yet safeguards trail behind...<\/p>\n\n\n\n<p>2025<\/p>\n\n\n\n<p><a href=\"http:\/\/www.ahlashkari.com\/PDFs\/Understanding%20AI%20in%20Cybersecurity%20and%20AI%20Security(UCSAISec)_AI%20Safety%20and%20Fairness%20Nowadays%20Explained%20(Article%205).pdf\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/the-tech-trend.com\/security\/ai-safety-and-fairness\/\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/the-tech-trend.com\/security\/future-work-in-healthcare\/\">Understanding Cybersecurity Management in Healthcare (UCSMH) - Cybersecurity Challenges, Best Practices, and Future Work in Healthcare (Article 4)<\/a><\/h2>\n\n\n\n<p>As healthcare professionals, IT professionals, and decision-makers in healthcare organizations, your role in exploring and addressing the potential security and privacy concerns in healthcare systems is crucial and highly valued. <\/p>\n\n\n\n<p>2024<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20Healthcare%20(UCSMH)%20-%20Defining%20Cybersecurity%20in%20Healthcare%20(Article%201).pdf\">Read PD<\/a><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20Healthcare%20(UCSMH)%20-%20Cybersecurity%20Challenges%20(Article%204).pdf\">F<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/the-tech-trend.com\/security\/future-work-in-healthcare\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read Mo<\/a><a href=\"https:\/\/hakin9.org\/defining-cybersecurity-in-healthcare\/\" target=\"_blank\" rel=\"noreferrer noopener\">re<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/the-tech-trend.com\/security\/ai-in-cybersecurity\/\">Understanding AI in Cybersecurity and AI Security: AI in Cybersecurity (UCSAISec-01)<\/a><\/h2>\n\n\n\n<p>Artificial intelligence (AI) is used in more tools to protect our data. With its ability to crunch vast volumes of data, recognize patterns, and adapt to new threats, AI helps cybersecurity shift from reactive to proactive. <\/p>\n\n\n\n<p>2025<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20AI%20in%20Cybersecurity%20and%20AI%20Security_%20AI%20in%20Cybersecurity%20(UCSAISec-01).pdf\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/the-tech-trend.com\/security\/ai-in-cybersecurity\/\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/the-tech-trend.com\/security\/ai-in-iot-and-ot-security\/\">Understanding AI in Cybersecurity and AI Security: AI in IoT and OT Security (UCSAISec-02)<\/a><\/h2>\n\n\n\n<p>The Internet of Things (IoT) has fundamentally changed how we interact with technology, creating networks of smart devices that talk to each other and collect valuable data.<\/p>\n\n\n\n<p>2025<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20AI%20in%20Cybersecurity%20and%20AI%20Security_%20AI%20in%20IoT%20and%20OT%20Security%20(UCSAISec-02).pdf\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/the-tech-trend.com\/security\/ai-in-iot-and-ot-security\/\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/the-tech-trend.com\/security\/cybersecurity-in-healthcare\/\">Understanding Cybersecurity Management in Healthcare (UCSMH) - Defining Cybersecurity in Healthcare (Article 1)<\/a><\/h2>\n\n\n\n<p>With healthcare accounting for 34% of cyberattacks in 2023, the sector is a prime target for cybercriminals exploiting vulnerabilities. Cybersecurity is critical for safeguarding sensitive patient data and ensuring medical systems operate without interruption. This article explores...<\/p>\n\n\n\n<p>2024<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20Healthcare%20(UCSMH)%20-%20Defining%20Cybersecurity%20in%20Healthcare%20(Article%201).pdf\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/the-tech-trend.com\/security\/cybersecurity-in-healthcare\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read Mo<\/a><a href=\"https:\/\/hakin9.org\/defining-cybersecurity-in-healthcare\/\" target=\"_blank\" rel=\"noreferrer noopener\">re<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/the-tech-trend.com\/security\/cybersecurity-in-healthcare\/\"><\/a><a href=\"https:\/\/the-tech-trend.com\/security\/cyber-attacks-in-healthcare\/\">Understanding Cybersecurity Management in Healthcare: Detection and Prevention of Cyber-attacks in Healthcare (Article 2)<\/a><\/h2>\n\n\n\n<p>Cybersecurity is no longer just a technical issue for the IT department in healthcare \u2013 it\u2019s a frontline defense for patient safety, operational continuity, and institutional trust. The healthcare industry faces unique challenges due to its reliance on sensitive data, interconnected devices, and ...<\/p>\n\n\n\n<p>2024<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20Healthcare%20(UCSMH)%20-%20Detection%20and%20Prevention%20of%20Cyber-attacks%20in%20Healthcare%20(Article%202).pdf\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/the-tech-trend.com\/security\/cyber-attacks-in-healthcare\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read Mo<\/a><a href=\"https:\/\/hakin9.org\/defining-cybersecurity-in-healthcare\/\" target=\"_blank\" rel=\"noreferrer noopener\">re<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/the-tech-trend.com\/security\/cyber-attacks-in-healthcare\/\">Understanding Cybersecurity Management in Healthcare: Cybersecurity Governance and <\/a><a href=\"https:\/\/the-tech-trend.com\/security\/cybersecurity-governance-and-ethics-in-healthcare\/\">Ethics in Healthcare (Article 3)<\/a><\/h2>\n\n\n\n<p>Data governance in healthcare sets the framework for decision-making and accountability around managing data \u2013 from its creation and use to its final archiving or disposal (Gartner, 2024). It\u2019s crucial for making data in all forms available, secure, and useful across healthcare organizations....<\/p>\n\n\n\n<p>2024<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20Healthcare%20(UCSMH)%20-%20Cybersecurity%20Governance%20and%20Ethics%20in%20Healthcare%20(Article%203).pdf\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/the-tech-trend.com\/security\/cybersecurity-governance-and-ethics-in-healthcare\/\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-smart-contracts-and-defi-security-and-threats-article-5\/542461\">Understanding Cybersecurity Management in Healthcare (UCSMH) - Defining Cybersecurity in Healthcare (Article 1)<\/a><\/h2>\n\n\n\n<p>The Windows Phone was first known as Windows Mobile in its early days, until Microsoft recognized the need to adapt and innovate in response to the competitive landscape of the smartphone market. After the changes introduced by Apple (iOS) and Google (Android) in 2007, Microsoft decided to take a new direction and created Windows Phone as a response....<\/p>\n\n\n\n<p>2024<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20on%20Smartphones%20(UCSph)%20-%20Windows%20Phone%20Operating%20System%20(Article%202).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-blockchain-security-article-4\/540075\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/cybersguards.com\/exploring-alternative-smartphone-oss-beyond-android-and-ios-for-security\/\">Understanding Cybersecurity on Smartphones (UCSph) - Alternative Smartphone OSs(Article 3)<\/a> <\/h2>\n\n\n\n<p>As part of the Understanding Cybersecurity Series (UCS) knowledge mobilization program, this article delves into seven common Smartphone OSs. Are you curious about niche smartphone OS options beyond Windows, Android, and iOS?This article explores seven alternative operating systems:&nbsp;<strong>Symbian, Tizen OS, Sailfish OS, Ubuntu Touch, KaiOS, Sirin OS,<\/strong>&nbsp;and&nbsp;<strong>Harmony OS<\/strong>.&nbsp;....<\/p>\n\n\n\n<p>2024<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20on%20Smartphones%20(UCSph)%20-%20Exploring%20Alternative%20Smartphone%20OSs_%20Beyond%20Android%20and%20iOS%20for%20Security%20(Article%203).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/cybersguards.com\/exploring-alternative-smartphone-oss-beyond-android-and-ios-for-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/the-tech-trend.com\/software-development\/mobile-application-security\/\">Understanding Cybersecurity on Smartphones (UCSph) - Mobile Application Security (Article 4)<\/a><\/h2>\n\n\n\n<p>As mobile apps become integral to our lives, they also expose users to a growing range of security threats. These threats exploit system vulnerabilities, impacting both individuals and connected systems. The constrained processing capabilities and streamlined interfaces of mobile devices further obscures these malicious activities...<\/p>\n\n\n\n<p>2024<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20on%20Smartphones%20(UCSph)%20-%20The%20Challenges%20in%20Mobile%20Application%20Security%202024%20(Article%204).pdf\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/the-tech-trend.com\/software-development\/mobile-application-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-defi-platforms-article-3\/537847\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-blockchain-security-article-4\/540075\">Understanding Cybersecurity Management in DeFi (UCM-DeFi) \u2013 Blockchain Security (Article 4)<\/a><\/h2>\n\n\n\n<p><meta charset=\"utf-8\">Smart contracts have transformed how legal agreements are managed and carried out, but they come with their own share of potential flaws and security risks.&nbsp;These shortcomings make smart contracts susceptible to hacking, which can lead to substantial financial losses...<\/p>\n\n\n\n<p>2023<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20DeFi%20(UCM-DeFi)%20%E2%80%93%20Smart%20Contracts%20and%20DeFi%20Security%20and%20Threats%20(Article%205).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-blockchain-security-article-4\/540075\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><meta charset=\"utf-8\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-introduction-to-smart-contracts-and-defi-article-2\/536621\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-introduction-to-smart-contracts-and-defi-article-2\/536621\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-smart-contracts-and-defi-security-and-threats-article-5\/542461\">Understanding Cybersecurity Management in DeFi (UCM-DeFi) \u2013 Smart Contracts and DeFi Security and Threats (Article 5)<\/a><\/h2>\n\n\n\n<p>Smart contracts have transformed how legal agreements are managed and carried out, but they come with their own share of potential flaws and security risks. These shortcomings make smart contracts susceptible to hacking, which can lead to substantial financial losses ...<\/p>\n\n\n\n<p>2023<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20DeFi%20(UCM-DeFi)%20%E2%80%93%20Introduction%20to%20Smart%20Contracts%20and%20DeFi%20(Article%202).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read<\/a><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20DeFi%20(UCM-DeFi)%20%E2%80%93%20Smart%20Contracts%20and%20DeFi%20Security%20and%20Threats%20(Article%205).pdf\" target=\"_blank\" rel=\"noreferrer noopener\"> PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-smart-contracts-and-defi-security-and-threats-article-5\/542461\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><meta charset=\"utf-8\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-introduction-to-smart-contracts-and-defi-article-2\/536621\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-introduction-to-smart-contracts-and-defi-article-2\/536621\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-smart-contracts-and-defi-security-and-threats-article-5\/542461\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-smart-contracts-and-defi-security-and-threats-article-5\/542461\">Understanding Cybersecurity on Smartphones (UCSph) - iOS Operating System (Article 1)<\/a><\/h2>\n\n\n\n<p>The smartphone is one of the most remarkable inventions in contemporary human history and is currently the most widely utilized electronic device globally.&nbsp;Its evolution has transformed modern communication technology, allowing us to communicate efficiently and instantly across vast distances worldwide ...<\/p>\n\n\n\n<p>2024<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20DeFi%20(UCM-DeFi)%20%E2%80%93%20Introduction%20to%20Smart%20Contracts%20and%20DeFi%20(Article%202).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read<\/a><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20on%20Smartphones%20(UCSph)%20-%20iOS%20Operating%20System%20(Article%201).pdf\" target=\"_blank\" rel=\"noreferrer noopener\"> PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-smart-contracts-and-defi-security-and-threats-article-5\/542461\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><meta charset=\"utf-8\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-defi-platforms-article-3\/537847\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding current c<\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-defi-platforms-article-3\/537847\">Understanding Cybersecurity Management in DeFi (UCM-DeFi) \u2013 DeFi Platforms (Article 3)<\/a><\/h2>\n\n\n\n<p><meta charset=\"utf-8\">With strong competition among countries around the world to become cutting edge leaders in AI, artificial intelligence has been a driving force of innovation in the digital economy. Indeed, Canada has been working to place itself among other global leaders in dynamic AI development, with the Canadian artificial intelligence sector receiving...<\/p>\n\n\n\n<p>2023<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20DeFi%20(UCM-DeFi)%20%E2%80%93%20DeFi%20Platforms%20(Article%203).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-defi-platforms-article-3\/537847\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><meta charset=\"utf-8\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-introduction-to-smart-contracts-and-defi-article-2\/536621\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-introduction-to-smart-contracts-and-defi-article-2\/536621\">Understanding Cybersecurity Management in DeFi (UCM-DeFi) \u2013 Introduction to Smart Contracts and DeFi (Article 2)<\/a><\/h2>\n\n\n\n<p>Smart contracts are digital versions of traditional legal agreements programmed to automate the execution of terms and conditions without intermediaries. They are a crucial part of many blockchains and distributed ledger technology applications. However, their immutability can make modifications challenging ...<\/p>\n\n\n\n<p>2023<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20DeFi%20(UCM-DeFi)%20%E2%80%93%20Introduction%20to%20Smart%20Contracts%20and%20DeFi%20(Article%202).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-introduction-to-smart-contracts-and-defi-article-2\/536621\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><meta charset=\"utf-8\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-the-origin-of-modern-decentralized-finance-article-1\/533357\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-the-origin-of-modern-decentralized-finance-article-1\/533357\">Understanding Cybersecurity Management in DeFi (UCM-DeFi) \u2013 The Origin of Modern Decentralized Finance (Article 1)<\/a><\/h2>\n\n\n\n<p>The modern financial system has become more decentralized, moving away from the centralized system used by banks in the past. Decentralized finance (DeFi) eliminates intermediaries from transactions, allowing for two or more users to execute financial transactions without a central authority..<\/p>\n\n\n\n<p>2023<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Cybersecurity%20Management%20in%20DeFi%20(UCM-DeFi)%20%E2%80%93%20The%20Origin%20of%20Modern%20Decentralized%20Finance%20(Article%201).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-in-defi-ucm-defi-the-origin-of-modern-decentralized-finance-article-1\/533357\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><meta charset=\"utf-8\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-legal-considerations-for-artificial-intelligence-and-technological-development-article-6\/499560\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding current cybersecurity challenges in law (UCCCL) - Legal Considerations for Artificial Intelligence and Technological Development (Article 6)<\/a><\/h2>\n\n\n\n<p><meta charset=\"utf-8\">With strong competition among countries around the world to become cutting edge leaders in AI, artificial intelligence has been a driving force of innovation in the digital economy. Indeed, Canada has been working to place itself among other global leaders in dynamic AI development, with the Canadian artificial intelligence sector receiving...<\/p>\n\n\n\n<p>2022<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20current%20cybersecurity%20challenges%20in%20law%20(UCCCL)%20-%20Legal%20Considerations%20for%20Artificial%20Intelligence%20and%20Technological%20Development%20(Article%206).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-legal-considerations-for-artificial-intelligence-and-technological-development-article-6\/499560\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p>Data breaches are incidents in which information is stolen or taken from a system without the knowledge or authorization of the owner of that system. Data breaches can expose confidential, sensitive, or protected information to an unauthorized person or ...<\/p>\n\n\n\n<p>2022<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20current%20cybersecurity%20challenges%20in%20law%20(UCCCL)%20-%20Data%20Breaches%20and%20Increased%20Data%20Awareness%20(Article%205).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-data-breaches-and-increased-data-awareness-article-5\/499562\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p>Public broadcasting regulations and legislation have long provided the regulations for information which is shared in the public domain, including newspaper, radio, and television. During the COVID-19 pandemic we saw many of our family, friends, colleagues, and acquaintances...<\/p>\n\n\n\n<p>2022<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20current%20cybersecurity%20challenges%20in%20law%20(UCCCL)%20-%20balancing%20responsibilities%20in%20digital%20content%20censorship%20(Article%204).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-balancing-responsibilities-in-digital-content-censorship-article-4\/489457\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p>When a crime takes place or a dispute occurs between two parties who reside within the same geographic location, the determination of which law applies to that scenario is easily distinguished as being the law of that geographic location. When a dispute occurs between two parties ...<\/p>\n\n\n\n<p>2022<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20current%20cybersecurity%20challenges%20in%20law%20(UCCCL)%20-%20determining%20online%20jurisdictional%20authority%20(Article%203).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-determining-online-jurisdictional-authority-article-3\/485418\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p>Digital governance refers to the strategic management of a governing body or corporation, over that which is connected to their position and function online \u2013 including the impacts of their actions in that position...<\/p>\n\n\n\n<p>2022<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20current%20cybersecurity%20challenges%20in%20law%20(UCCCL)%20-%20digital%20governance%20and%20social%20responsibility%20meet%20user-generated%20content%20(Article%202).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-digital-governance-and-social-responsibility-meet-user-generated-content-article-2\/482543\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p>Most of us would likely be unsurprised to learn that the vast majority of our personal and professional data is stored in the cloud. The most popular social media apps \u2013 such as Instagram, Twitter, Facebook, and LinkedIn \u2013 all use cloud-based data storage for user accounts, profiles, uploaded content, and more... <\/p>\n\n\n\n<p>2022<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20current%20cybersecurity%20challenges%20in%20law%20(UCCCL)%20-%20digital%20governance%20and%20social%20responsibility%20meet%20user-generated%20content%20(Article%202).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-balancing-responsibilities-in-digital-content-censorship-article-4\/489457\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-security-issues-on-the-financial-market-infrastructures-article-6\/473440\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-security-issues-on-the-financial-market-infrastructures-article-6\/473440\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding cybersecurity management for FinTech: cybersecurity policy and strategy management (Article 6)<\/a><\/h2>\n\n\n\n<p>Cyber-attacks are on the rise with every passing day, and so is the cost associated with the damage caused by them. To protect the financial institutions from the menace of these cyber-attacks, a cybersecurity policy and strategy sets the standards to: monitor cyber activities on premises,... <\/p>\n\n\n\n<p>2022<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20cybersecurity%20management%20for%20FinTech%20(UCMF)%20-%20cybersecurity%20policy%20and%20strategy%20management%20(Article%206).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-security-issues-on-the-financial-market-infrastructures-article-6\/473440\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-security-issues-on-financial-market-infrastructures-article-5\/469942\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-security-issues-on-financial-market-infrastructures-article-5\/469942\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding cybersecurity management for FinTech: security issues on financial market infrastructures (Article 5)<\/a><\/h2>\n\n\n\n<p>Financial market infrastructure (FMI) serves as the backbone of financial markets. It allows financial transactions to take place between people, financial institutions, and businesses in a cheaper and more efficient manner. It is the key component between financial institutions that exchange payments,...<\/p>\n\n\n\n<p>2022<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20cybersecurity%20management%20for%20FinTech%20(UCMF)%20-%20security%20issues%20on%20financial%20market%20infrastructures%20(Article%205).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-security-issues-on-financial-market-infrastructures-article-5\/469942\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-cybersecurity-vulnerabilities-and-risk-in-fintech-article-4\/466709\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-cybersecurity-vulnerabilities-and-risk-in-fintech-article-4\/466709\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding cybersecurity management for FinTech: cybersecurity vulnerabilities and risk in FinTech (Article 4)<\/a><\/h2>\n\n\n\n<p>Public broadcasting regulations and legislation have long provided the regulations for information which is shared in the public domain, including newspaper, radio, and television. During the COVID-19 pandemic we saw many of our family, friends, colleagues, and acquaintances...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20cybersecurity%20management%20for%20FinTech%20(UCMF)%20-%20cybersecurity%20vulnerabilities%20and%20risk%20in%20fintech%20(Article%204).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-cybersecurity-vulnerabilities-and-risk-in-fintech-article-4\/466709\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-legal-considerations-for-artificial-intelligence-and-technological-development-article-6\/499560\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding cybersecurity management for FinTech: cybersecurity threats in FinTech (Article 3)<\/a><\/h2>\n\n\n\n<p>With a plethora of digital wallet methods, financial cyber risks such as fraudulent transactions, extortion, denial of service attacks, and credit card fraud have become frequent. These cyber-attacks are capable enough to cause systemic risk to the financial sector...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20cybersecurity%20management%20for%20FinTech%20(UCMF)%20-%20cybersecurity%20threats%20in%20fintech%20(Article%203).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-legal-considerations-for-artificial-intelligence-and-technological-development-article-6\/499560\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-information-security-governance-in-fintech-article-2\/459010\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-information-security-governance-in-fintech-article-2\/459010\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding cybersecurity management for FinTech : information security governance in FinTech (Article 2)<\/a><\/h2>\n\n\n\n<p>Information is the key to success in the contemporary era. Just as there are two sides of a coin, there are two perspectives of a cyber-attack. On one hand, attackers seek information to take advantage of potential flaws in an organization\u2019s architecture, processes, and design; exploiting these flaws to make money...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20cybersecurity%20management%20for%20FinTech%20(UCMF)%20-%20information%20security%20governance%20in%20FinTech%20(Article%202).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-information-security-governance-in-fintech-article-2\/459010\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-introduction-to-fintech-and-the-importance-of-security-objects-article-1\/457632\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-introduction-to-fintech-and-the-importance-of-security-objects-article-1\/457632\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding cybersecurity management for FinTech (UCMF) - introduction to FinTech and the importance of security objects (Article 1)<\/a><\/h2>\n\n\n\n<p>FinTech encompasses a wide array of technological strategies, many of which have either improved the functionality of existing financial products and services or enabled the development of novel technological solutions for the financial sector. With the rapid growth of digital platforms, ...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20cybersecurity%20management%20for%20FinTech%20(UCMF)%20-%20introduction%20to%20FinTech%20and%20the%20importance%20of%20security%20objects%20(Article%201).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-cybersecurity-management-for-fintech-introduction-to-fintech-and-the-importance-of-security-objects-article-1\/457632\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-file-infector-and-potentially-unwanted-applications-article-6\/455415\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-file-infector-and-potentially-unwanted-applications-article-6\/455415\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Android Malware Families (UAMF) \u2013 file infector and potentially unwanted applications (Article 6)<\/a><\/h2>\n\n\n\n<p>File infector is a malware that attaches itself to APK files, which contain all the data related to an Android application. File infector gets installed with APK files, and it gets executed when the APK file is installed. The APK file can be any Android application such as a game, word processing file, ...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Android%20Malware%20Families%20(UAMF)%20%E2%80%93%20file%20infector%20and%20potentially%20unwanted%20applications%20(Article%206).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-file-infector-and-potentially-unwanted-applications-article-6\/455415\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-part-5-adware-backdoor\/447798\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-part-5-adware-backdoor\/447798\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Android Malware Families (UAMF) \u2013 Adware and Backdoor (Article 5)<\/a><\/h2>\n\n\n\n<p>Mobile adware refers to the advertising material hidden inside legitimate apps infected by malware. Most of these apps are available from third-party sources. Adware continuously shows unwanted advertisements on mobile screens even if the user attempts to force-close the app... <\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Android%20Malware%20Families%20(UAMF)%20%E2%80%93%20Adware%20and%20Backdoor%20(Article%205).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-part-5-adware-backdoor\/447798\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-riskware-is-it-worth-it-article-4\/446692\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-riskware-is-it-worth-it-article-4\/446692\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Android Malware Families (UAMF) \u2013 Riskware \u2013 is it worth it? (Article 4)<\/a><\/h2>\n\n\n\n<p>Riskware is defined as a legitimate program that presents potential risks to the security vulnerabilities on a device. Although it is a legitimate program, bad actors use Riskware to steal information from the device and redirect users to malicious websites or perform functions at the expense of device security...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Android%20Malware%20Families%20(UAMF)%20%E2%80%93%20Riskware%20-%20is%20it%20worth%20it%20(Article%204).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-riskware-is-it-worth-it-article-4\/446692\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-refactored-our-series-in-summary\/446166\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-refactored-our-series-in-summary\/446166\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Canadian Cybersecurity Laws: refactored \u2014 our series in summary (Article 10)<\/a><\/h2>\n\n\n\n<p>In this tenth and final article in our Understanding Canadian Cybersecurity Laws series, we will look back through the previous nine articles and revisit the topics covered in each of them. Our journey begins with the first article, The Foundations, first published by IT World Canada on January 13, 2020...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20canadian%20cybersecurity%20laws%20refactored%20-Our%20series%20in%20summary%20(Article%2010).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-refactored-our-series-in-summary\/446166\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><meta charset=\"utf-8\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-data-breaches-and-increased-data-awareness-article-5\/499562\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding current cybersecurity challenges in law: Data Breaches and Increased Data Awareness (Article 5)<\/a><\/h2>\n\n\n\n<p>Data breaches are incidents in which information is stolen or taken from a system without the knowledge or authorization of the owner of that system. Data breaches can expose confidential, sensitive, or protected information to an unauthorized person or ...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20current%20cybersecurity%20challenges%20in%20law%20(UCCCL)%20-%20Data%20Breaches%20and%20Increased%20Data%20Awareness%20(Article%205).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-data-breaches-and-increased-data-awareness-article-5\/499562\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><meta charset=\"utf-8\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-balancing-responsibilities-in-digital-content-censorship-article-4\/489457\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding current cybersecurity challenges in law: balancing responsibilities in digital content censorship (Article 4)<\/a><\/h2>\n\n\n\n<p>Public broadcasting regulations and legislation have long provided the regulations for information which is shared in the public domain, including newspaper, radio, and television. During the COVID-19 pandemic we saw many of our family, friends, colleagues, and acquaintances...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20current%20cybersecurity%20challenges%20in%20law%20(UCCCL)%20-%20balancing%20responsibilities%20in%20digital%20content%20censorship%20(Article%204).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-current-cybersecurity-challenges-in-law-balancing-responsibilities-in-digital-content-censorship-article-4\/489457\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-ransomware-and-scareware-article-3\/445240\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-ransomware-and-scareware-article-3\/445240\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Android Malware Families (UAMF) \u2013 Ransomware and scareware (Article 3)<\/a><\/h2>\n\n\n\n<p>Ransomware is malicious software used by individuals to encrypt documents on computers or digital devices. Perpetrators demand a ransom from the owner of a device to access the victim\u2019s documents; once in, criminals install ransomware on their mobile phone or computer...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Android%20Malware%20Families%20(UAMF)%20%E2%80%93%20Ransomware%20and%20scareware%20(Article%203).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-ransomware-and-scareware-article-3\/445240\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-legislative-modernization-responding-and-adapting-to-technological-change-in-a-global-domain-article-9\/443132\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-legislative-modernization-responding-and-adapting-to-technological-change-in-a-global-domain-article-9\/443132\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Canadian Cybersecurity Laws: Legislative Modernization \u2014 Responding and Adapting to Technological Change in a Global Domain (Article 9)<\/a><\/h2>\n\n\n\n<p>In this article, we will discuss the Digital Charter Implementation Act, 2020, which was tabled by the government on November 17, 2020, along with its progeny: the Consumer Privacy Protection Act (CPPA) and the Personal Information and Data Tribunal Act...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Canadian%20Cybersecurity%20Laws%20Legislative%20Modernization%20-%20Responding%20and%20Adapting%20to%20Technological%20Change%20in%20a%20Global%20Domain%20(Article%209).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-legislative-modernization-responding-and-adapting-to-technological-change-in-a-global-domain-article-9\/443132\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-uamf-the-trojan-an-impersonator-in-the-background-article-2\/443083\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-uamf-the-trojan-an-impersonator-in-the-background-article-2\/443083\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Android Malware Families (UAMF) \u2013 The Trojan: An impersonator in the background (Article 2)<\/a><\/h2>\n\n\n\n<p>The trojan is a sneaky impersonator that behaves like a legitimate program. It can hide in the background and steal information from the device. Trojan samples often delete, modify, block, and copy data to disrupt services provided by the operating system...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Android%20Malware%20Families%20(UAMF)%20%E2%80%93%20The%20Trojan%20An%20impersonator%20in%20the%20background%20(Article%202).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-uamf-the-trojan-an-impersonator-in-the-background-article-2\/443083\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-uamf-the-foundations-article-1\/441562\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-uamf-the-foundations-article-1\/441562\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Android Malware Families (UAMF) \u2013 The Foundations (Article 1)<\/a><\/h2>\n\n\n\n<p>Android malware is one of the most serious threats on the internet and has witnessed an unprecedented upsurge in recent years. There is a need to share the fundamental understanding of behaviour...<\/p>\n\n\n\n<p>2021<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Android%20Malware%20Families%20(UAMF)%20%E2%80%93%20The%20Foundations%20(Article%201)%20_%20IT%20World%20Canada%20Blog.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-android-malware-families-uamf-the-foundations-article-1\/441562\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-measuring-up-outlining-existing-federal-cybersecurity-legislation-in-canada-the-uk-australia-and-the-us-article-8\/440137\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Canadian Cybersecurity Laws: Measuring Up \u2014 Outlining Existing National Cybersecurity Legislation in Canada, the UK, Australia, and the US (Article 8)<\/a><\/h2>\n\n\n\n<p>In this article, we will outline the relevant national privacy and cybersecurity-related laws currently in effect in the United Kingdom, Australia, and the United States, as fellow common law countries...<\/p>\n\n\n\n<p>2020<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Canadian%20Cybersecurity%20Laws%20Measuring%20up%20-%20Outlining%20existing%20federal%20cybersecurity%20legislation%20in%20(Article%208).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-measuring-up-outlining-existing-federal-cybersecurity-legislation-in-canada-the-uk-australia-and-the-us-article-8\/440137\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-deep-dark-and-undetectable-canadian-jurisdictional-considerations-in-global-encrypted-networks-article-7\/438587\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-deep-dark-and-undetectable-canadian-jurisdictional-considerations-in-global-encrypted-networks-article-7\/438587\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Canadian cybersecurity laws: Deep, dark, and undetectable \u2013 Canadian jurisdictional considerations in global encrypted networks (Article 7)<\/a><\/h2>\n\n\n\n<p>The rapid growth of encryption technology has revolutionized the online marketplace and helped to enable the creation of anonymous online networks, like the Dark Net ...<\/p>\n\n\n\n<p>2020<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Canadian%20cybersecurity%20laws%20Deep-dark%20and%20undetectable%20-%20Canadian%20jurisdictional%20considerations%20in%20global%20encrypted%20networks%20(Article%207).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-deep-dark-and-undetectable-canadian-jurisdictional-considerations-in-global-encrypted-networks-article-7\/438587\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-peer-to-peer-privacy-protection-intrusion-upon-seclusion-and-the-protection-of-intimate-images-article-6\/437022\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-peer-to-peer-privacy-protection-intrusion-upon-seclusion-and-the-protection-of-intimate-images-article-6\/437022\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Canadian cybersecurity laws: Peer-to-peer privacy protection - \u201cIntrusion upon seclusion\u201d and the protection of intimate images (Article 6)<\/a><\/h2>\n\n\n\n<p>The prevalence of digital communication has created nearly limitless possibilities for the rapid, large-scale sharing of private communications, intimate images, and personal information...<\/p>\n\n\n\n<p>2020<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Canadian%20cybersecurity%20laws%20Peer-to-peer%20privacy%20protection%20-%20Intrusion%20upon%20seclusion%20and%20the%20protection%20of%20intimate%20images%20(Article%206).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-peer-to-peer-privacy-protection-intrusion-upon-seclusion-and-the-protection-of-intimate-images-article-6\/437022\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-insert-something-clever-here-canadas-anti-spam-legislation-article-5\/434004\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-insert-something-clever-here-canadas-anti-spam-legislation-article-5\/434004\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Canadian Cybersecurity Laws: Insert Something Clever Here - Canada\u2019s Anti-Spam Legislation (Article 5)<\/a><\/h2>\n\n\n\n<p>As we continue to adapt to the changing demands to navigate the spread of COVID-19, an increasing number of workspaces and social interactions have had to rely much more heavily on email and ...<\/p>\n\n\n\n<p>2020<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Canadian%20cybersecurity%20laws%20Insert%20something%20clever%20here%20-%20Canadas%20Anti-Spam%20Legislation%20(Article%205).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-insert-something-clever-here-canadas-anti-spam-legislation-article-5\/434004\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-interpersonal-privacy-and-cybercrime-criminal-code-of-canada-part-4\/432084\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-interpersonal-privacy-and-cybercrime-criminal-code-of-canada-part-4\/432084\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Canadian Cybersecurity Laws: Interpersonal Privacy and Cybercrime - Criminal Code of Canada (Article 4)<\/a><\/h2>\n\n\n\n<p>The global spread of COVID-19 has been a huge catalyst in our increased reliance on digital technologies, particularly our networked communication infrastructure. With the rapid influx of demand for ...<\/p>\n\n\n\n<p>2020<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Canadian%20cybersecurity%20laws%20Interpersonal%20privacy%20and%20cybercrime%20-%20Criminal%20Code%20of%20Canada%20(Article%204).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-interpersonal-privacy-and-cybercrime-criminal-code-of-canada-part-4\/432084\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-peer-to-peer-privacy-protection-intrusion-upon-seclusion-and-the-protection-of-intimate-images-article-6\/437022\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-privacy-protection-in-the-modern-marketplace-pipeda-part-3\/429697\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Canadian cybersecurity laws: Privacy Protection in the Modern Marketplace-PIPEDA (Article 3)<\/a><\/h2>\n\n\n\n<p>With the global spread of COVID-19, on-line scams are circulating and malicious actors have been spreading malware intended to steal individual information through both personal and corporate networks. We previously outlined... <\/p>\n\n\n\n<p>2020<\/p>\n\n\n\n<p><meta charset=\"utf-8\"><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Canadian%20cybersecurity%20laws%20Privacy%20protection%20in%20the%20modern%20marketplace%20-%20PIPEDA%20(Article%203).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-privacy-protection-in-the-modern-marketplace-pipeda-part-3\/429697\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-law-privacy-and-access-to-information-the-acts-part-2\/427697\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-law-privacy-and-access-to-information-the-acts-part-2\/427697\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Canadian cybersecurity laws: Privacy and access to information, the Acts (Article 2)<\/a><\/h2>\n\n\n\n<p>The Privacy Act and the Access to Information Act were both implemented by the Canadian federal government in 1985 and have acted as a starting point for more recent legislation...<\/p>\n\n\n\n<p>2020<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Canadian%20cybersecurity%20laws%20Privacy%20and%20access%20to%20information%20the%20Acts%20(Article%202).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-law-privacy-and-access-to-information-the-acts-part-2\/427697\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading h6 text-uppercase text-primary\"><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-the-foundations\/425979\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-the-foundations\/425979\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Canadian cybersecurity laws: the foundations (Article 1)<\/a><\/h2>\n\n\n\n<p>The end of 2019 marked the end of a decade that has been shaped by rapid technological development, advancing data-use research, and an increasingly hyper-connective global infrastructure...<\/p>\n\n\n\n<p>2020<\/p>\n\n\n\n<p><a href=\"http:\/\/ahlashkari.com\/PDFs\/Understanding%20Android%20Malware%20Families%20(UAMF)%20%E2%80%93%20The%20Foundations%20(Article%201).pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Read PDF<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.itworldcanada.com\/blog\/understanding-canadian-cybersecurity-laws-the-foundations\/425979\" target=\"_blank\" rel=\"noreferrer noopener\">Read More<\/a><\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As part of the Understanding Cybersecurity Series (UCS) program at BCCC, we plan to create non-technical materials in addition to academic articles, book chapters, and books. These materials will cater to a broad audience, including youth, seniors, laypeople, and the general public. We will disseminate relevant findings to the public through digital social communication channels [&hellip;]<\/p>\n","protected":false},"author":1159,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"tags":[8,17,12,18,13,16],"class_list":["post-356","page","type-page","status-publish","hentry","tag-behaviour-centric-cybersecurity-center-bccc","tag-blogs","tag-everyone","tag-media","tag-public","tag-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Online Blogs - Behaviour-Centric Cybersecurity Center (BCCC)<\/title>\n<meta name=\"description\" content=\"In addition to academic materials such as articles, book chapters, and books, we plan to create non-technical materials that cater to a broad audience, including youth, seniors, laypeople, and the general public. We will disseminate relevant findings to the public through digital social communication channels like LinkedIn and Twitter and through publication blogs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yorku.ca\/research\/bccc\/ucs-blogs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online Blogs - Behaviour-Centric Cybersecurity Center (BCCC)\" \/>\n<meta property=\"og:description\" content=\"In addition to academic materials such as articles, book chapters, and books, we plan to create non-technical materials that cater to a broad audience, including youth, seniors, laypeople, and the general public. We will disseminate relevant findings to the public through digital social communication channels like LinkedIn and Twitter and through publication blogs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yorku.ca\/research\/bccc\/ucs-blogs\/\" \/>\n<meta property=\"og:site_name\" content=\"Behaviour-Centric Cybersecurity Center (BCCC)\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-07T14:05:11+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/ucs-blogs\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/ucs-blogs\\\/\",\"name\":\"Online Blogs - Behaviour-Centric Cybersecurity Center (BCCC)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/#website\"},\"datePublished\":\"2023-05-11T13:23:37+00:00\",\"dateModified\":\"2025-10-07T14:05:11+00:00\",\"description\":\"In addition to academic materials such as articles, book chapters, and books, we plan to create non-technical materials that cater to a broad audience, including youth, seniors, laypeople, and the general public. We will disseminate relevant findings to the public through digital social communication channels like LinkedIn and Twitter and through publication blogs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/ucs-blogs\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/ucs-blogs\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/ucs-blogs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Online Blogs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/#website\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/\",\"name\":\"Behaviour-Centric Cybersecurity Center (BCCC)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Online Blogs - Behaviour-Centric Cybersecurity Center (BCCC)","description":"In addition to academic materials such as articles, book chapters, and books, we plan to create non-technical materials that cater to a broad audience, including youth, seniors, laypeople, and the general public. We will disseminate relevant findings to the public through digital social communication channels like LinkedIn and Twitter and through publication blogs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yorku.ca\/research\/bccc\/ucs-blogs\/","og_locale":"en_US","og_type":"article","og_title":"Online Blogs - Behaviour-Centric Cybersecurity Center (BCCC)","og_description":"In addition to academic materials such as articles, book chapters, and books, we plan to create non-technical materials that cater to a broad audience, including youth, seniors, laypeople, and the general public. We will disseminate relevant findings to the public through digital social communication channels like LinkedIn and Twitter and through publication blogs.","og_url":"https:\/\/www.yorku.ca\/research\/bccc\/ucs-blogs\/","og_site_name":"Behaviour-Centric Cybersecurity Center (BCCC)","article_modified_time":"2025-10-07T14:05:11+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yorku.ca\/research\/bccc\/ucs-blogs\/","url":"https:\/\/www.yorku.ca\/research\/bccc\/ucs-blogs\/","name":"Online Blogs - Behaviour-Centric Cybersecurity Center (BCCC)","isPartOf":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/#website"},"datePublished":"2023-05-11T13:23:37+00:00","dateModified":"2025-10-07T14:05:11+00:00","description":"In addition to academic materials such as articles, book chapters, and books, we plan to create non-technical materials that cater to a broad audience, including youth, seniors, laypeople, and the general public. We will disseminate relevant findings to the public through digital social communication channels like LinkedIn and Twitter and through publication blogs.","breadcrumb":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/ucs-blogs\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yorku.ca\/research\/bccc\/ucs-blogs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.yorku.ca\/research\/bccc\/ucs-blogs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yorku.ca\/research\/bccc\/"},{"@type":"ListItem","position":2,"name":"Online Blogs"}]},{"@type":"WebSite","@id":"https:\/\/www.yorku.ca\/research\/bccc\/#website","url":"https:\/\/www.yorku.ca\/research\/bccc\/","name":"Behaviour-Centric Cybersecurity Center (BCCC)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yorku.ca\/research\/bccc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"}]}},"taxonomy_info":{"post_tag":[{"value":8,"label":"Behaviour-Centric Cybersecurity Center (BCCC)"},{"value":17,"label":"Blogs"},{"value":12,"label":"Everyone"},{"value":18,"label":"Media"},{"value":13,"label":"Public"},{"value":16,"label":"Research"}]},"featured_image_src_large":false,"author_info":{"display_name":"ahabibil","author_link":"https:\/\/www.yorku.ca\/research\/bccc\/author\/ahabibil\/"},"comment_info":"","_links":{"self":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages\/356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/users\/1159"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/comments?post=356"}],"version-history":[{"count":55,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages\/356\/revisions"}],"predecessor-version":[{"id":3160,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages\/356\/revisions\/3160"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/media?parent=356"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/tags?post=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}