My Account Log in

1 option

Understand the cyber attacker mindset : build a strategic security programme to counteract threats / Sarah Armstrong-Smith.

Ebook Central Perpetual, DDA and Subscription Titles Available online

View online
Format:
Book
Author/Creator:
Armstrong-Smith, Sarah, author.
Contributor:
ProQuest ebook central
Samuel W. Golden Book Fund.
Language:
English
Subjects (All):
Cyberterrorism--Prevention.
Cyberterrorism.
Computer security.
Hackers--Psychology.
Hackers.
Physical Description:
1 online resource (305 p.)
Place of Publication:
London, United Kingdom ; New York, NY, USA : Kogan Page, [2024]
Contents:
Cover
Contents
List of figures and tables
About the author
Foreword
Preface
Acknowledgements
PART ONE Understanding types of attack, how they operate and why they are successful
01 The evolution of cybercrime in the digital age
A PC in every home
Dawn of the World Wide Web
The dot.com bubble becomes lucrative
Rise of social media
The internet of everything
AI and automation
Conclusion
References
02 Understanding the will and motivation of attackers
Understanding the social sciences
The art of social engineering
The fraudster's mindset
The seven sins of attackers
Why cybercrime?
03 Types of cyber attack and why they work
The power of persuasion
Victimology and impact
Return on investment
Phishing
Impersonation
Honey trap
Blackmail and extortion
Disinformation and propaganda
04 How Covid-19 created an epidemic of cybercrime
A new pandemic is declared
How the pandemic impacted people's livelihoods
Preying on the fear of the unknown
Antivax campaigns seed disinformation
References
05 Cybercrime as a service
a booming enterprise
Establishing skill sets
Navigating the criminal underworld
A look inside criminal networks
Types of exploit
Exploit subscriptions
As-a-service business models
Cyber weapons for hire
PART TWO Incidents, lessons learnt and the rise of the insider threat
06 Opportunists and activists
how anyone can become a cybercriminal
Establishing accountability for actions
Case study: The story of Brandon Fleury
Case study: The story of Navinder Sarao
Insight into the mindset of an activist
Lauri Love
07 New kids on the block
new groups making names for themselves
Naming and attribution of groups
From disruption to destruction
Lapsus
Analysing Lapsus
08 Syndicates
how groups work together to build services and avoid detection
Tracking the most successful cybercrime syndicate in history
FIN7
Analysing FIN7
09 Brokers
law enforcement headaches in tracking cybercrime and money laundering
Money laundering as a service
Disrupting criminal dark-web marketplaces
Nigeria's celebrity scammers
The burden of proof
A new wave of cyber sanctions
10 Influencers
how nation-sponsored actors change social dynamics
Understanding strategic cultures
Dominant cyber superpowers
The role of offensive and defensive cyber
Russian Federation (Russia)
Democratic People's Republic of Korea (North Korea)
Analysing nation-sponsored actors
11 Insiders
how attackers take advantage of internal loopholes
What is an insider threat?
Notes:
Includes bibliographical references and index.
Description based upon print version of record.
Rise of the super malicious insider
Electronic reproduction. Ann Arbor, MI Available via World Wide Web.
Local Notes:
Acquired for the Penn Libraries with assistance from the Samuel W. Golden Book Fund.
Other Format:
Print version: Armstrong-Smith, Sarah Understand the Cyber Attacker Mindset
ISBN:
1398614297
9781398614291
Publisher Number:
40032222074
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account