CHAPTER 1 ORIGINS OF CYBERSECURITY AND CYBERCRIME
Introduction
Cyberspace
Cybersecurity
History
Timeline
Cybersecurity Subdomains
Case Study
Discussion Questions
References
CHAPTER 2 CYBERCRIMINAL CULTURE
Origin of Hacking
Types of Hacker Hats
Hacker Community
Aspects of the Hacking Community
Hacker Motivation
Tactics, Techniques, and Procedures (TTPs)
Timeline
Marriott Data Breach Exposes PII, Credit Cards
Case Study
Discussion Questions
References
CHAPTER 3 TRANSNATIONAL CYBER CRIMINALS AND CYBERTERRORISM
Cybercrime Markets
Cyberterrorism
Case Study
Discussion Questions
References
CHAPTER 4 NATIONSTATE ACTORS
Russia
China
North Korea
Iran (APT33, –34, –35, and –39)
Case Study
Discussion Questions
Further Reading
CHAPTER 5 VULNERABILITIES AND THREATS-TTP’S
Types of Cyber Vulnerabilities and Threats
Ransomware-as-a-Service
Virus
Password Cracking
Brute-Force Attack
Social Engineering
Zero Day Exploits
Segment Networks
SIM Swapping
Virtual Private Networks
USB Charging
BitTorrent
SCADA (Supervisory control and data acquisition)
Data Is the New Oil
Dataveillance
Real-Time Location Services
Case Study
Discussion Questions
References
CHAPTER 6 TOR AND THE DARK WEB
The Dark Web
Cryptocurrency
Blockchain
Case Study
Nonfungible Token
Metaverse
Breached Data
Case Study
Discussion Questions
Reference
CHAPTER 7 CYBER LEGAL ISSUES
Cybercrime Jurisdiction
Budapest Convention
Computer Fraud and Abuse Act (CFAA)
Cybersecurity Bills Become Law
Internationally Recognized Law—Indian Government Digital Personal Data Protection Bill 2022
US National Data Privacy and Security Framework
Case Study
Discussion Questions
References
CHAPTER 8 CYBERSECURITY ORGANIZATIONS
Fighting Cybercrime
CISA (Cybersecurity and Infrastructure Security Agency, Department of Homeland Security)
FBI (Federal Bureau of Investigation)
U.S. Cyber Command
U. S. Army Cyber Command
Bureau of Cyberspace and Digital Policy (U.S. Department of State)
Interpol
Private Sector (this is just one example of many organizations involved in cybersecurity)
Case Study
Discussion Questions
References
CHAPTER 9 THE FUTURE OF CYBERCRIME: EMERGING CYBER TOOLS AND TECHNIQUES
Threats to Space Security
Ransomware as the “New Norm” for Hostage Situations
Database Nation with Increased Threats
VPNs
Fake Websites
Deepfakes
5G Security
Human Error
Case Study
Discussion Questions
References
Appendix
Index
Author Information