Limit search to available items
Book Cover
E-book
Author Willems, Eddy, 1962- author.

Title Cyberdanger : understanding and guarding against cybercrime / Eddy Willems
Published Cham, Switzerland : Springer, [2019]

Copies

Description 1 online resource
Contents Intro; Acknowledgments; Introduction; All Aboard?; My Youth and Technology; First Experiences, First PC; The Malware Train Had Left the Station; My Years as an Evangelist; Disclaimer; Contents; About the Author; Chapter 1: Thirty Years of Malware: A Short Outline; 1.1 What Is Malware?; 1.2 What Is a Virus?; 1.3 The First Generation; 1.4 Generation Internet; 1.5 The Mobile Generation; 1.6 Finally; Chapter 2: Malware Author Profiles; 2.1 The Graffiti Sprayer and Script Kiddies; 2.2 Cybercriminals; 2.3 Malicious by Ignorance, Not by Design; 2.4 The Authorities and Government Departments
2.5 And What About the Hacktivists?2.6 Gigabyte: Made in Belgium; 2.7 Virus Developers and Virus Hunters; Chapter 3: The Digital Underground Economy; 3.1 How Is the Digital Underground Economy Organized?; 3.2 Is Everything for Sale?; 3.3 How a Mass Attack Works: Botnets and Their Structure; 3.4 And What About the Victim?; 3.5 Conclusion: E-crime Is on the Rise; Chapter 4: From Cyberwar to Hacktivism; 4.1 Cyberwar; 4.1.1 The Cloud as a Battlefield?; 4.1.2 Stuxnet; 4.2 Cyberterrorism; 4.3 Hacktivism; 4.4 Cyberespionage; 4.4.1 Stuxnetś Relatives; 4.5 Last but Not Least
4.6 Some (Final) Final ThoughtsChapter 5: The Antivirus Companies; 5.1 The Manufacturer; 5.2 Nonprofit Organizations in the Fight Against Cybercrime; 5.2.1 CARO; 5.2.2 EICAR; 5.2.3 AMTSO; 5.2.4 The WildList; 5.2.5 Test Sites; 5.2.6 Other Organizations and Services; Chapter 6: Todayś Threats; 6.1 Botnets; 6.2 Ransomware; 6.3 Social Networks; 6.4 Portable Media; 6.5 Attack and This Time on Businesses!; 6.6 Mobile Targets; 6.7 Online Banking: Beware of the Man-in-the-Browser; 6.8 PUPs, PUS, and PUAs; 6.9 Cryptocurrency and Cryptojacking: Virtual Currency and Real Criminals
Chapter 7: Malware Myths7.1 Myth 1: If I Do Not Notice Anything Suspicious on My Computer, It Is Not Infected; 7.2 Myth 2: There Is Absolutely No Need for Expensive Security Software. There Are Free Programs That Are At Least as Good!; 7.3 Myth 3: Most Malicious Software Is Sent as an Email Attachment; 7.4 Myth 4: My PC or Network Cannot Be Harmed by My Visiting a Website, If I Dont́ Download Anything; 7.5 Myth 5: Malware Is Most Commonly Downloaded Through Peer-to-Peer and Torrent Sites
7.6 Myth 6: Visiting a Porn Site Is More Likely to Result in Being Attacked by Malware than Looking at a Page About Equestrian ... 7.7 Myth 7: If I Do Not Open an Infected File, It Can't Do Any Harm; 7.8 Myth 8: Most Malicious Software Is Distributed via USB Sticks; 7.9 Myth 9: I Can Save Myself the Expense of Security Software or Hardware, Because I Know My Way Around and Only Visit Safe W ... ; 7.10 Myth 10: My PC Holds No Valuable Data-So Why Would Anyone Attack It?; 7.11 Myth 11: My PC Doesnt́ Run Windows, So It Is Quite Safe; 7.12 Myth 12: Malware Is Written by Antivirus Vendors
Summary This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It's also a valuable introduction for the general reader who wants to learn about cybersecurity
Notes Online resource; title from PDF title page (EBSCO, viewed May 9, 2019)
Subject Cyberterrorism -- Prevention
Terrorism -- Prevention.
Computer crimes.
BUSINESS & ECONOMICS -- Infrastructure.
SOCIAL SCIENCE -- General.
Computer crimes
Cyberterrorism -- Prevention
Terrorism -- Prevention
Form Electronic book
ISBN 9783030045319
3030045315
3030045307
9783030045302
9783030045326
3030045323
Other Titles Cybergevaar. English