𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape

✍ Scribed by Akashdeep Bhardwaj


Publisher
CRC Press
Year
2024
Tongue
English
Leaves
209
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


β€˜Insecure Digital Frontiers’ is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize. From the shadows of cybercriminal exploits to the sophisticated dance of advanced persistence threats, this book delves into the vulnerabilities that define our interconnected world. With a panoramic lens, it navigates through the challenges and opportunities that shape the global cybersecurity landscape, offering readers a comprehensive understanding of the insecurities that permeate our digital existence.

β€˜Insecure Digital Frontiers’ is not just a book; it is an exploration of the insecurities that define our digital age. It matters because it goes beyond the surface, unraveling the complexities of cyber threats while providing actionable insights for individuals, organizations, and policymakers. In a world where the digital frontier is both a promise and a peril, this book serves as a guide for navigating the insecurities that define our interconnected existence.

Embark on this journey through the "Insecure Digital Frontiers" and discover the vulnerabilities that lurk in the shadows, the innovations that promise security, and the collective responsibility we share in securing our digital future.

✦ Table of Contents


Cover
Half Title
Title Page
Copyright Page
Table of Contents
Foreword
Preface
About the Author
Chapter 1 Hidden Cyber Realm: The Dark Web
1.1 Introduction
1.2 Dark Web Markets
1.2.1 Silk Road
1.2.2 AlphaBay
1.2.3 Wall Street Market
1.2.4 DarkMarket
1.3 The Onion Router
1.4 Agencies Against Dark Web
1.5 Hands On: Dark Web Search
1.6 Conclusion
References
Chapter 2 New-Age Cyberattack Trends
2.1 Introduction
2.2 Ransomware Attacks
2.2.1 Ryuk Ransomware
2.2.2 WannaCry Ransomware
2.2.3 NotPetya
2.3 Fileless Malware
2.4 Living-Off-The-Land Attacks
2.5 Deepfake Attacks
2.6 Zero Click Exploits
2.7 Phishing Attacks
2.8 Recent Cyberattacks
2.8.1 SolarWinds Hack
SolarWinds Attack Pseudo Code
2.8.2 Blackbaud Hack
2.8.3 Mirai Botnet
2.9 Digital Forensics for Cybersecurity
2.10 Conclusion
References
Chapter 3 New Frontiers in Cyber Warfare
3.1 Introduction
3.1.1 Stuxnet
3.1.2 NotPetya
3.1.3 WannaCry
3.1.4 SolarWinds Attack
3.1.5 Colonial Pipeline Attack
3.2 Rise of AI-Enabling Cyberattackers
3.3 New Vulnerabilities in Cloud Computing
3.4 Growing Popularity of Mobile Devices
3.5 Conclusion
References
Chapter 4 APT: The New-Age Threat Vectors
4.1 Introducing Advanced Persistent Threats
4.2 Literature Review
4.3 Operation Aurora
4.4 Stuxnet
4.5 APT1
4.6 Operation Ke3chang
4.7 APT29
4.8 Operation OilRig
4.9 Conclusion
References
Chapter 5 AI-Powered Cyberattacks
5.1 Introduction
5.2 Cybersecurity Attacks Using AI and ML
5.3 Deepfake Phishing
5.3 Spear Phishing With Reinforcement Learning
5.4 Evolving Malware With Genetic Algorithms
5.5 Potential Benefits of Cyber-AI
5.6 Conclusion
References
Chapter 6 Supply Chain Attacks
6.1 Introduction
6.2 Types of Supply Chain Attacks
6.2.1 Software Attacks
6.2.2 Network Attacks
6.2.3 Hardware Attacks
6.2.4 Third-Party Service Attacks
6.2.5 Physical Attacks
6.2.6 Social Engineering Attacks
6.3 Case Studies of Supply Chain Cyberattacks
6.3.1 Case Study 1: SolarWinds Attack
6.3.2 Case Study 2: Codecov Attack
6.3.3 Case Study 3: Kaseya Attack
6.3.4 Case Study 4: Equifax Data Breach
6.4 Potential Attack Scenarios
6.4.1 Cloud Service Provider Compromise
6.4.2 IoT Supply Chain Vulnerabilities
6.4.3 Supply Chain Manipulation in Critical Infrastructure
6.4.4 Deepfake Supply Chain Attacks
6.4.5 Ransomware-As-A-Service Supply Chain Attacks
6.4.6 Blockchain Supply Chain Attacks
6.4.7 Zero-Day Exploits in Supply Chain Software
6.5 Hands-On: Eternal Blue Exploitation
6.6 Conclusion
References
Chapter 7 Digital Terrorism Trends of the New Millennium
7.1 Introduction
7.2 Use Cases
7.2.1 Disrupting Critical Infrastructure
7.2.2 Weaponizing Information
7.2.3 Ransomware Extortion
7.3 Cyber Espionage and Digital Terrorism
7.4 Ideological Warfare in Cyberspace
7.5 State-Sponsored Cyberattacks: Tactics and Strategies
7.6 Evolving Face of Digital Terrorism
7.7 Conclusion
References
Chapter 8 Security Risk Assessment of ICS
8.1 Introduction
8.1.1 Critical ICS Domains
8.1.2 Cybersecurity Attacks On ICS
8.1.3 Insider Threats On ICS
8.1.4 Natural Disasters Against ICS
8.2 Understanding ICS Risk Assessment
8.2.1 Identifying Assets
8.2.2 Threat Identification
8.2.3 Vulnerability Analysis
8.2.4 Impact Assessment
8.2.5 Risk Mitigation Strategies
8.3 Threat Landscape for ICS
8.3.1 Qualitative Risk Assessment
8.3.2 Quantitative Risk Assessment
8.3.3 Threat Intelligence Sharing
8.4 ICS Security Strategy and Frameworks
8.4.1 Defense-In-Depth
8.4.2 NIST Cybersecurity Framework
8.4.3 Continuous Security Monitoring
8.4.4 Incident Response Planning
8.5 Use Case: Risk Assessment Sheets
8.6 Conclusion
Index


πŸ“œ SIMILAR VOLUMES


Solving The Digital Marketing Jigsaw Puz
✍ Alan Hennessy πŸ“‚ Library πŸ“… 2022 πŸ› The Digital Mentor 🌐 English

<span>Alan helps you to navigate The Digital Marketing Landscape. In order for us to be visible online, we need to understand the fundamentals of Digital Marketing.<br><br>This is a detailed deep dive into the online world, and how you can embrace it, and fast-track your marketing with proven method

Hacking in the Humanities: Cybersecurity
✍ Aaron Mauro πŸ“‚ Library πŸ“… 2022 πŸ› Bloomsbury Academic 🌐 English

<p><span>What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and

Hacking in the Humanities: Cybersecurity
✍ Aaron Mauro πŸ“‚ Library πŸ“… 2022 πŸ› Bloomsbury Academic 🌐 English

What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human – and humanist

Navigating Digital Health Landscapes: A
✍ Anna Lydia Svalastog, SreΔ‡ko GajoviΔ‡, Andrew Webster πŸ“‚ Library πŸ“… 2021 πŸ› Springer Singapore;Palgrave Macmillan 🌐 English

<p><i>Navigating Digital Health Landscapes</i> explores how users navigate the internet when searching for health information. It is the first book to conceptualise the internet as a landscape and the ways in which people navigate this digital world, including the complex entanglements between on an