Cyber Crimes and Cyber Criminals

Author(s): Mark H. Beaudry

Edition: 1

Copyright: 2023

Pages: 150

Choose Your Format

Choose Your Platform | Help Me Choose

Ebook

$47.25

ISBN 9798385102914

Details Electronic Delivery EBOOK 180 days

CHAPTER 1 ORIGINS OF CYBERSECURITY AND CYBERCRIME 
Introduction 
Cyberspace 
Cybersecurity 
History 
Timeline 
Cybersecurity Subdomains 
Case Study 
Discussion Questions 
References 

CHAPTER 2 CYBERCRIMINAL CULTURE 
Origin of Hacking
Types of Hacker Hats 
Hacker Community 
Aspects of the Hacking Community 
Hacker Motivation 
Tactics, Techniques, and Procedures (TTPs) 
Timeline 
Marriott Data Breach Exposes PII, Credit Cards 
Case Study 
Discussion Questions 
References 

CHAPTER 3 TRANSNATIONAL CYBER CRIMINALS AND CYBERTERRORISM 
Cybercrime Markets 
Cyberterrorism 
Case Study 
Discussion Questions 
References 

CHAPTER 4 NATIONSTATE ACTORS 
Russia 
China 
North Korea 
Iran (APT33, –34, –35, and –39) 
Case Study 
Discussion Questions 
Further Reading 

CHAPTER 5 VULNERABILITIES AND THREATS-TTP’S 
Types of Cyber Vulnerabilities and Threats 
Ransomware-as-a-Service 
Virus 
Password Cracking 
Brute-Force Attack 
Social Engineering 
Zero Day Exploits 
Segment Networks 
SIM Swapping 
Virtual Private Networks 
USB Charging 
BitTorrent 
SCADA (Supervisory control and data acquisition) 
Data Is the New Oil 
Dataveillance 
Real-Time Location Services 
Case Study 
Discussion Questions 
References 

CHAPTER 6 TOR AND THE DARK WEB 
The Dark Web 
Cryptocurrency 
Blockchain 
Case Study 
Nonfungible Token 
Metaverse 
Breached Data 
Case Study 
Discussion Questions 
Reference 

CHAPTER 7 CYBER LEGAL ISSUES 
Cybercrime Jurisdiction 
Budapest Convention 
Computer Fraud and Abuse Act (CFAA) 
Cybersecurity Bills Become Law 
Internationally Recognized Law—Indian Government Digital Personal Data Protection Bill 2022 
US National Data Privacy and Security Framework 
Case Study 
Discussion Questions 
References 

CHAPTER 8 CYBERSECURITY ORGANIZATIONS 
Fighting Cybercrime 
CISA (Cybersecurity and Infrastructure Security Agency, Department of Homeland Security) 
FBI (Federal Bureau of Investigation) 
U.S. Cyber Command 
U. S. Army Cyber Command 
Bureau of Cyberspace and Digital Policy (U.S. Department of State) 
Interpol 
Private Sector (this is just one example of many organizations involved in cybersecurity) 
Case Study 
Discussion Questions 
References 

CHAPTER 9 THE FUTURE OF CYBERCRIME: EMERGING CYBER TOOLS AND TECHNIQUES 
Threats to Space Security 
Ransomware as the “New Norm” for Hostage Situations 
Database Nation with Increased Threats 
VPNs 
Fake Websites 
Deepfakes 
5G Security 
Human Error 
Case Study 
Discussion Questions 
References 

Appendix 
Index 
Author Information

Mark H. Beaudry

CHAPTER 1 ORIGINS OF CYBERSECURITY AND CYBERCRIME 
Introduction 
Cyberspace 
Cybersecurity 
History 
Timeline 
Cybersecurity Subdomains 
Case Study 
Discussion Questions 
References 

CHAPTER 2 CYBERCRIMINAL CULTURE 
Origin of Hacking
Types of Hacker Hats 
Hacker Community 
Aspects of the Hacking Community 
Hacker Motivation 
Tactics, Techniques, and Procedures (TTPs) 
Timeline 
Marriott Data Breach Exposes PII, Credit Cards 
Case Study 
Discussion Questions 
References 

CHAPTER 3 TRANSNATIONAL CYBER CRIMINALS AND CYBERTERRORISM 
Cybercrime Markets 
Cyberterrorism 
Case Study 
Discussion Questions 
References 

CHAPTER 4 NATIONSTATE ACTORS 
Russia 
China 
North Korea 
Iran (APT33, –34, –35, and –39) 
Case Study 
Discussion Questions 
Further Reading 

CHAPTER 5 VULNERABILITIES AND THREATS-TTP’S 
Types of Cyber Vulnerabilities and Threats 
Ransomware-as-a-Service 
Virus 
Password Cracking 
Brute-Force Attack 
Social Engineering 
Zero Day Exploits 
Segment Networks 
SIM Swapping 
Virtual Private Networks 
USB Charging 
BitTorrent 
SCADA (Supervisory control and data acquisition) 
Data Is the New Oil 
Dataveillance 
Real-Time Location Services 
Case Study 
Discussion Questions 
References 

CHAPTER 6 TOR AND THE DARK WEB 
The Dark Web 
Cryptocurrency 
Blockchain 
Case Study 
Nonfungible Token 
Metaverse 
Breached Data 
Case Study 
Discussion Questions 
Reference 

CHAPTER 7 CYBER LEGAL ISSUES 
Cybercrime Jurisdiction 
Budapest Convention 
Computer Fraud and Abuse Act (CFAA) 
Cybersecurity Bills Become Law 
Internationally Recognized Law—Indian Government Digital Personal Data Protection Bill 2022 
US National Data Privacy and Security Framework 
Case Study 
Discussion Questions 
References 

CHAPTER 8 CYBERSECURITY ORGANIZATIONS 
Fighting Cybercrime 
CISA (Cybersecurity and Infrastructure Security Agency, Department of Homeland Security) 
FBI (Federal Bureau of Investigation) 
U.S. Cyber Command 
U. S. Army Cyber Command 
Bureau of Cyberspace and Digital Policy (U.S. Department of State) 
Interpol 
Private Sector (this is just one example of many organizations involved in cybersecurity) 
Case Study 
Discussion Questions 
References 

CHAPTER 9 THE FUTURE OF CYBERCRIME: EMERGING CYBER TOOLS AND TECHNIQUES 
Threats to Space Security 
Ransomware as the “New Norm” for Hostage Situations 
Database Nation with Increased Threats 
VPNs 
Fake Websites 
Deepfakes 
5G Security 
Human Error 
Case Study 
Discussion Questions 
References 

Appendix 
Index 
Author Information

Mark H. Beaudry