Today it is no longer possible to think about the world of work without reviewing all the many technological and information technology tools that characterize it. From the simplest, such as email and search engines, to the most complex, such as artificial intelligence and robotic systems, these are tools characterized by a very high level of pervasiveness and penetration.
This requires knowledge of both the rules of use and the relevant regulations, as well as the risks and threats associated with the use of such tools. Although these are rapidly evolving threats whose every detail cannot be known, it is good to recognize their “fingerprints.” The sections in this chapter therefore aim to outline the main elements that characterize cyber threats to information security