Limit search to available items
Book Cover
E-book
Author Olejnik, Lukasz

Title Philosophy of Cybersecurity
Published Milton : Taylor & Francis Group, 2023

Copies

Description 1 online resource (225 p.)
Contents Cover -- Half Title -- Endorsement Page -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Authors -- Chapter 1: Introduction to the philosophy of cybersecurity -- 1.1 A few words about history -- 1.1.1 The history of viruses and malware -- 1.1.2 Interest groups and hacker groups -- 1.1.3 Why cybersecurity has become important -- 1.2 The gradual increase in the role and importance of cybersecurity -- 1.2.1 The problem of scale -- 1.3 The international and military dimension -- 1.4 What is the philosophy of cybersecurity -- how do we understand it?
1.5 Is cybersecurity achievable? -- 1.5.1 Confidentiality, integrity, and availability -- 1.5.2 For an ordinary user -- 1.5.3 Business use -- 1.5.4 State -- 1.5.5 The global problem -- 1.5.5.1 The problem of international stability -- 1.6 Important questions and a myth -- 1.6.1 The question of physical destruction -- 1.7 Is cybersecurity even achievable? -- Notes -- Chapter 2: Cyber threats and the necessary clarifications -- 2.1 Risk -- 2.2 Different types of risk -- 2.2.1 Artificial Intelligence and risk -- 2.2.2 Human rights -- 2.3 Briefly about cyberattacks
2.4 Kill chain -- a useful thought model -- 2.4.1 Reconnaissance -- 2.4.2 Weaponization -- 2.4.3 Delivery -- 2.4.4 Exploitation -- 2.4.5 Installation -- 2.4.6 Command and control -- 2.4.7 Achieving goals -- 2.4.8 Kill chain -- summary -- 2.5 The MITRE model -- 2.6 Social engineering and phishing -- 2.6.1 Masquerade in France using the "minister" method -- 2.7 Threat groups -- 2.7.1 Hacktivists -- 2.7.2 Cybercriminals -- 2.7.3 State groups, APT -- 2.7.4 Groups -- synthesis -- 2.8 Cyber tools or cyberweapons? -- 2.8.1 Types of tools -- a question of aims -- 2.8.1.1 Estonia (2007) -- 2.8.2 Exploit
2.9 CVE and security bug branding -- 2.9.1 20-year-old security vulnerabilities? -- 2.9.2 The economy of security bugs and exploits -- 2.9.3 Frameworks and other tools -- 2.10 Ransomware -- 2.10.1 Data loss and ransom -- 2.10.2 Business model -- money is the target -- 2.10.3 How to protect yourself -- Rule 3-2-1 -- 2.10.4 Geopolitical and legal problem -- Corsairs of the twenty-first century ? -- Notes -- Chapter 3: Cybersecurity from the user's point of view -- 3.1 Cybersecurity as a problem of ordinary people -- 3.1.1 Digitization is progressing and what comes of it
3.1.2 Do we build dependencies ourselves? -- 3.1.3 Data center on fire -- talking about hard luck! -- 3.2 You have to protect yourself -- is it possible? HOW DO YOU DO IT? -- 3.2.1 Problems also for experts -- 3.2.2 Security is the increase in costs for attackers -- 3.2.3 Pay attention to what matters -- 3.2.3.1 The question of resources and scale -- 3.2.4 Risk modeling -- 3.2.5 What are the actual threats to us? -- 3.3 The Iron rules -- 3.3.1 Technology is for people -- 3.3.2 Vendors should take care of basic security -- the importance of ecosystems -- 3.3.3 The risk surface
Summary This is a book for everyone - a wide audience. Experts, academic lecturers, as well as students of technical fields such as computer science and social sciences will find the content interesting
Notes Description based upon print version of record
3.3.3.1 Mapping the ways of use
Subject Computer security -- Social aspects
Computer security -- Political aspects
Computer security -- Social aspects.
Form Electronic book
Author KurasiƄski, Artur
ISBN 9781000956009
1000956008