𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cybercrime And Cybersecurity

✍ Scribed by Paul A. Watters


Publisher
Routledge | Taylor & Francis Group
Year
2024
Tongue
English
Leaves
183
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The field of cybersecurity and cybercrime is a critical and rapidly evolving area of study. As our society becomes more and more reliant on technology, the risks of cybercrime increase. This book provides a comprehensive introduction to the field, covering both cybercrime and cybersecurity. The book starts by providing an overview of common threats and the risk management view of cybercrime. It explores the different types of threats, such as hacking, malware, phishing, and social engineering, and the various ways in which they can impact individuals, businesses, and society at large. It also introduces the concept of risk management and the different approaches that can be used to manage cyber risks, such as risk avoidance, mitigation, transfer, and acceptance. From there, the book delves into the three key areas of cybersecurity: people, process, and technology. It explores the role of people in cybersecurity, including staffing, psychological profiling, role sensitivity, awareness, training, and education. It also examines the importance of process, including strategy and governance, policy, configuration management, and physical security. Finally, the book explores the critical role of technology, including system security, identification and authentication, authorisation and access control, and cryptography. The book is designed to be accessible to a wide range of readers, from first-year students studying cybercrime and cybersecurity for the first time to seasoned professionals who need to better understand the purpose of cybersecurity programmes and controls. It is written in a clear and concise manner, with each chapter building on the previous one to provide a comprehensive overview of the field. Overall, this book is an essential resource for anyone interested in the field of cybersecurity and cybercrime. It provides a critical introduction to the key concepts, theories, and practices in the field, and is sure to be a valuable reference for years to come.

✦ Table of Contents


Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
Foreword
Preface
Acknowledgements
About the Author
1 Introduction
Confidentiality
Integrity
Availability
Conclusion
Notes
2 Risk Management
Risk Assessment Scope
Analysing Data
Risk Mitigation Or Acceptance?
Case Study: Which Country Is Most Likely to Attack?
Conclusion
Notes
3 Threats
Mistakes
Stealing and Fraud
Employee Sabotage
Supporting Infrastructure Loss
Hacking
Espionage (Commercial and Government)
Malicious Code (Malware)
Scams
Case Study: Data Loss in the British Government
Conclusion
Notes
4 Organisational Responses
The Cybersecurity Strategy
Policy
Organisational Policy
Issue-Specific Policy
Entity-Specific Policy
Roles and Responsibilities
Management
Planning
Accreditation
Assurance
Design Assurance
Operational Assurance
Insurance
Case Study: Monitoring the Underground Economy
Conclusion
Notes
5 Operational Security: Users
Staffing
Separation of Duties
Least Privilege
Role Sensitivity
User Compliance
Fraud Detection
Termination
Managing Users
Internet-Facing Systems
Bring Your Own Device (BYOD)
Psychological Factors
Cognition
Emotion (Mood)
Motivation
Learning
Modifying User Behaviour
Awareness
Training
Education
Case Study: A Non-Associative Model of Phishing
Conclusion
Notes
6 Operational Security: Systems
Physical Security
Conclusion
Notes
7 Operational Security: Threat Response
Situational Crime Prevention
Incident Response
Disaster Response
Conclusion
Notes
8 Technical Responses: Securing Systems
Identification and Authentication
Something You Know
Something You Have
Something You Are
Authorisation and Access Control
Cryptography
Symmetric Ciphers
Steganography
Antivirus
Conclusion
Notes
9 Technical Responses: Forensics
Conclusion
Notes
10 Technical Responses: Penetration Testing
Breaking Into Your Own Network
Breaking Your Own Applications
Conclusion
Notes
11 Regulatory and Legal Responses
Expert Juries
How Specialised Is Computer Technology?
How Extensive Is the Core Body of Knowledge in Computing?
What About Specialisations Like Computer Forensics?
How Should Expert Juries Be Selected?
Why Can’t We Just Have Expert Witnesses?
What Has Been the International Experience?
Conclusion
12 Honeypots and Deception
Child Exploitation as a Cybercrime
Technical Mechanisms for Warning Message Delivery
The Classic Case
The Broader Case
Legal Issues
Conclusion
Notes
Index

✦ Subjects


Computer Crimes; Computer Security


πŸ“œ SIMILAR VOLUMES


Cyberspace, Cybersecurity, and Cybercrim
✍ Janine Kremling; Amanda M Sharp Parker πŸ“‚ Library πŸ“… 2017 πŸ› Sage Publications, Inc 🌐 English

Presented from a criminal justice perspective,<strong>Cyberspace, Cybersecurity, and Cybercrime</strong>introduces students to the interdisciplinary field of cybercrime by exploring the theoretical, practical, and legal framework it operates under, along with strategies to combat it. Authors Janine

Cybercrime in the Pandemic Digital Age a
✍ Russell G. Smith (editor), Rick Sarre (editor), Lennon Yao-Chung Chang (editor), πŸ“‚ Library πŸ› Palgrave Macmillan 🌐 English

<p><span>This edited collection presents current research dealing with crime involving information and communications technologies in the months immediately before, during and following the coronavirus pandemic since 2019. Information and communications technologies played a pivotal role during the

Advances in Cybersecurity, Cybercrimes,
✍ Ahmed A. Abd El-Latif; Yassine Maleh; Wojciech Mazurczyk; Mohammed ELAffendi; Mo πŸ“‚ Library πŸ“… 2023 πŸ› Springer Nature 🌐 English

This book gathers the proceedings of the International conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies, held on May 10–11, 2022, in Riyadh, Saudi Arabia. The conference organized by the College of Computer Science of Prince Sultan University, Saudi Arabia. This book provide

Personal Cybersecurity: How to Avoid and
✍ Marvin Waschke πŸ“‚ Library πŸ“… 2017 πŸ› Apress 🌐 English

<div><p>Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. </p></div>

Research agenda. The human factor in cyb
✍ Eric Rutger Leukfeldt πŸ“‚ Library πŸ“… 2017 πŸ› Eleven International Publishing 🌐 English

This research agenda is the outcome of the national cybercrime initiative (β€˜NASA Cybercrime’) coordinated by the Netherlands Institute for the Study of Crime and Law Enforcement (NSCR) and funded by the Netherlands Organization for Scientifc Research (NWO).