Amazon cover image
Image from Amazon.com

Cyberdanger [electronic resource] : Understanding and Guarding Against Cybercrime /

By: Contributor(s): Material type: TextTextPublisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019Description: XXII, 218 p. 70 illus., 67 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030045319
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Thirty Years of Malware: A Short Outline -- Malware Author Profiles -- The Digital Underground Economy -- From Cyberwar to Hacktivism -- The Antivirus Companies -- Today's Threats -- Malware Myths -- Tips for Consumers: How to Travel Safely on the Information Superhighway -- Tips for Companies: Surviving on the Internet -- The Role of Government -- The Media -- The Digital Future -- Awakening: A Short Story. .
In: Springer Nature eBookSummary: This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leadingindustry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It’s also a valuable introduction for the general reader who wants to learn about cybersecurity.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Thirty Years of Malware: A Short Outline -- Malware Author Profiles -- The Digital Underground Economy -- From Cyberwar to Hacktivism -- The Antivirus Companies -- Today's Threats -- Malware Myths -- Tips for Consumers: How to Travel Safely on the Information Superhighway -- Tips for Companies: Surviving on the Internet -- The Role of Government -- The Media -- The Digital Future -- Awakening: A Short Story. .

This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leadingindustry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It’s also a valuable introduction for the general reader who wants to learn about cybersecurity.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in