Description |
1 online resource (225 p.) |
Contents |
Cover -- Half Title -- Endorsement Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Authors -- Chapter 1: Introduction to the philosophy of cybersecurity -- 1.1 A few words about history -- 1.1.1 The history of viruses and malware -- 1.1.2 Interest groups and hacker groups -- 1.1.3 Why cybersecurity has become important -- 1.2 The gradual increase in the role and importance of cybersecurity -- 1.2.1 The problem of scale -- 1.3 The international and military dimension -- 1.4 What is the philosophy of cybersecurity -- how do we understand it? |
|
1.5 Is cybersecurity achievable? -- 1.5.1 Confidentiality, integrity, and availability -- 1.5.2 For an ordinary user -- 1.5.3 Business use -- 1.5.4 State -- 1.5.5 The global problem -- 1.5.5.1 The problem of international stability -- 1.6 Important questions and a myth -- 1.6.1 The question of physical destruction -- 1.7 Is cybersecurity even achievable? -- Notes -- Chapter 2: Cyber threats and the necessary clarifications -- 2.1 Risk -- 2.2 Different types of risk -- 2.2.1 Artificial Intelligence and risk -- 2.2.2 Human rights -- 2.3 Briefly about cyberattacks |
|
2.4 Kill chain -- a useful thought model -- 2.4.1 Reconnaissance -- 2.4.2 Weaponization -- 2.4.3 Delivery -- 2.4.4 Exploitation -- 2.4.5 Installation -- 2.4.6 Command and control -- 2.4.7 Achieving goals -- 2.4.8 Kill chain -- summary -- 2.5 The MITRE model -- 2.6 Social engineering and phishing -- 2.6.1 Masquerade in France using the "minister" method -- 2.7 Threat groups -- 2.7.1 Hacktivists -- 2.7.2 Cybercriminals -- 2.7.3 State groups, APT -- 2.7.4 Groups -- synthesis -- 2.8 Cyber tools or cyberweapons? -- 2.8.1 Types of tools -- a question of aims -- 2.8.1.1 Estonia (2007) -- 2.8.2 Exploit |
|
2.9 CVE and security bug branding -- 2.9.1 20-year-old security vulnerabilities? -- 2.9.2 The economy of security bugs and exploits -- 2.9.3 Frameworks and other tools -- 2.10 Ransomware -- 2.10.1 Data loss and ransom -- 2.10.2 Business model -- money is the target -- 2.10.3 How to protect yourself -- Rule 3-2-1 -- 2.10.4 Geopolitical and legal problem -- Corsairs of the twenty-first century ? -- Notes -- Chapter 3: Cybersecurity from the user's point of view -- 3.1 Cybersecurity as a problem of ordinary people -- 3.1.1 Digitization is progressing and what comes of it |
|
3.1.2 Do we build dependencies ourselves? -- 3.1.3 Data center on fire -- talking about hard luck! -- 3.2 You have to protect yourself -- is it possible? HOW DO YOU DO IT? -- 3.2.1 Problems also for experts -- 3.2.2 Security is the increase in costs for attackers -- 3.2.3 Pay attention to what matters -- 3.2.3.1 The question of resources and scale -- 3.2.4 Risk modeling -- 3.2.5 What are the actual threats to us? -- 3.3 The Iron rules -- 3.3.1 Technology is for people -- 3.3.2 Vendors should take care of basic security -- the importance of ecosystems -- 3.3.3 The risk surface |
Summary |
This is a book for everyone - a wide audience. Experts, academic lecturers, as well as students of technical fields such as computer science and social sciences will find the content interesting |
Notes |
Description based upon print version of record |
|
3.3.3.1 Mapping the ways of use |
Subject |
Computer security -- Social aspects
|
|
Computer security -- Political aspects
|
|
Computer security -- Social aspects.
|
Form |
Electronic book
|
Author |
KurasiĆski, Artur
|
ISBN |
9781000956009 |
|
1000956008 |
|