1 option
Understand the cyber attacker mindset : build a strategic security programme to counteract threats / Sarah Armstrong-Smith.
- Format:
- Book
- Author/Creator:
- Armstrong-Smith, Sarah, author.
- Language:
- English
- Subjects (All):
- Cyberterrorism--Prevention.
- Cyberterrorism.
- Computer security.
- Hackers--Psychology.
- Hackers.
- Physical Description:
- 1 online resource (305 p.)
- Place of Publication:
- London, United Kingdom ; New York, NY, USA : Kogan Page, [2024]
- Contents:
- Cover
- Contents
- List of figures and tables
- About the author
- Foreword
- Preface
- Acknowledgements
- PART ONE Understanding types of attack, how they operate and why they are successful
- 01 The evolution of cybercrime in the digital age
- A PC in every home
- Dawn of the World Wide Web
- The dot.com bubble becomes lucrative
- Rise of social media
- The internet of everything
- AI and automation
- Conclusion
- References
- 02 Understanding the will and motivation of attackers
- Understanding the social sciences
- The art of social engineering
- The fraudster's mindset
- The seven sins of attackers
- Why cybercrime?
- 03 Types of cyber attack and why they work
- The power of persuasion
- Victimology and impact
- Return on investment
- Phishing
- Impersonation
- Honey trap
- Blackmail and extortion
- Disinformation and propaganda
- 04 How Covid-19 created an epidemic of cybercrime
- A new pandemic is declared
- How the pandemic impacted people's livelihoods
- Preying on the fear of the unknown
- Antivax campaigns seed disinformation
- References
- 05 Cybercrime as a service
- a booming enterprise
- Establishing skill sets
- Navigating the criminal underworld
- A look inside criminal networks
- Types of exploit
- Exploit subscriptions
- As-a-service business models
- Cyber weapons for hire
- PART TWO Incidents, lessons learnt and the rise of the insider threat
- 06 Opportunists and activists
- how anyone can become a cybercriminal
- Establishing accountability for actions
- Case study: The story of Brandon Fleury
- Case study: The story of Navinder Sarao
- Insight into the mindset of an activist
- Lauri Love
- 07 New kids on the block
- new groups making names for themselves
- Naming and attribution of groups
- From disruption to destruction
- Lapsus
- Analysing Lapsus
- 08 Syndicates
- how groups work together to build services and avoid detection
- Tracking the most successful cybercrime syndicate in history
- FIN7
- Analysing FIN7
- 09 Brokers
- law enforcement headaches in tracking cybercrime and money laundering
- Money laundering as a service
- Disrupting criminal dark-web marketplaces
- Nigeria's celebrity scammers
- The burden of proof
- A new wave of cyber sanctions
- 10 Influencers
- how nation-sponsored actors change social dynamics
- Understanding strategic cultures
- Dominant cyber superpowers
- The role of offensive and defensive cyber
- Russian Federation (Russia)
- Democratic People's Republic of Korea (North Korea)
- Analysing nation-sponsored actors
- 11 Insiders
- how attackers take advantage of internal loopholes
- What is an insider threat?
- Notes:
- Includes bibliographical references and index.
- Description based upon print version of record.
- Rise of the super malicious insider
- Electronic reproduction. Ann Arbor, MI Available via World Wide Web.
- Local Notes:
- Acquired for the Penn Libraries with assistance from the Samuel W. Golden Book Fund.
- Other Format:
- Print version: Armstrong-Smith, Sarah Understand the Cyber Attacker Mindset
- ISBN:
- 1398614297
- 9781398614291
- Publisher Number:
- 40032222074
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.