Cybercrime and Cybersecurity
(CYBERCRIME.AV1) / ISBN : 978-1-64459-597-8
This course includes
Lessons
TestPrep
Lab
AI Tutor (Add-on)
About This Course
Skills You’ll Get
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
13+ Interactive Lessons |
Gamified TestPrep
1
Preface
2
Introduction
- CIA traid
- Confidentiality
- Integrity
- Availability
- Conclusion
3
Risk Management
- Introduction
- Risk Assessment Scope
- Analysing Data
- Risk Mitigation or Acceptance?
- Case Study: Which Country Is Most Likely to Attack?
- Conclusion
4
Threats
- Introduction
- Mistakes
- Stealing and Fraud
- Employee Sabotage
- Supporting Infrastructure Loss
- Hacking
- Espionage (Commercial and Government)
- Malicious Code (Malware)
- Scams
- Case Study: Data Loss in the British Government
- Conclusion
5
Organisational Responses
- Introduction
- The Cybersecurity Strategy
- Case Study: Monitoring the Underground Economy
- Conclusion
6
Operational Security: Users
- Introduction
- Staffing
- Managing Users
- Psychological Factors
- Modifying User Behaviour
- Case Study: A Non-Associative Model of Phishing
- Conclusion
7
Operational Security: Systems
- Introduction
- Physical Security
- Conclusion
8
Operational Security: Threat Response
- Introduction
- Situational Crime Prevention
- Incident Response
- Disaster Response
- Conclusion
9
Technical Responses: Securing Systems
- Introduction
- Identification and Authentication
- Authorisation and Access Control
- Cryptography
- Steganography
- Antivirus
- Conclusion
10
Technical Responses: Forensics
- Conclusion
11
Technical Responses: Penetration Testing
- Introduction
- Breaking into Your Own Network
- Breaking Your Own Applications
- Conclusion
12
Regulatory and Legal Responses
- Introduction
- Expert Juries
- Conclusion
13
Honeypots and Deception
- Introduction
- Child Exploitation as a Cybercrime
- Technical Mechanisms for Warning Message Delivery
- The Classic Case
- The Broader Case
- Legal Issues
- Conclusion