Skip to main content

2019 | Buch

Cyberdanger

Understanding and Guarding Against Cybercrime

insite
SUCHEN

Über dieses Buch

This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media.

The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts.

The book is important reading for all professionals engaged with securing information, people, and enterprises. It’s also a valuable introduction for the general reader who wants to learn about cybersecurity.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Thirty Years of Malware: A Short Outline
Abstract
First, a warning: people with lively imaginations might find this chapter rather unpleasant. Because it is full of viruses, worms, and other uninvited guests such as Trojans. And yet you should deal with the various forms of malware, the unwanted software in your system and on your hard drive, rather than trying not to think about them. As a small compensation you will learn interesting things about Anna Kournikova and even enjoy a declaration of love.
Eddy Willems
Chapter 2. Malware Author Profiles
Abstract
Hackers and people who write malware are by no means always criminal geniuses. In fact, not all malware authors have, historically, intentionally set out to break the law, though nowadays most are quite happy to do so where there are high profits and low risks. Here we take a closer look at the psychology of the malware developer.
Eddy Willems
Chapter 3. The Digital Underground Economy
Abstract
It could be suggested that the dangers we have encountered so far were relatively harmless. But now we dive deep into the underground and find the dark corners of the cyberworld where criminals thrive. Down there in the underworld, we no longer have to deal with amateur hackers boasting about how many websites they’ve accessed. Today’s hackers boast about how many credit cards they steal with their botnet. Credit card data is worth cash.
Eddy Willems
Chapter 4. From Cyberwar to Hacktivism
Abstract
Chapter 3 showed us that behind the familiar facade of cyberspace lurks a dark and dangerous world. But that’s not all. Even governments are not disinterested, neutral players: they use cyberweapons in a variety of ways to manipulate, spy on, and even fight against other nations. Therefore, we should not be surprised that government agencies taking action against other nation states have also discovered and deployed digital weapons. We are now going into the binary trenches to find out whether the digital James Bond likes his vodka martinis “shaken, not stirred.”
Eddy Willems
Chapter 5. The Antivirus Companies
Abstract
There’s no denying that it is becoming increasingly difficult to combat cybercrime. The stakes are getting higher, the gangsters are getting more and more professional, and now there are cyberspies, cybersabotage, and threats of cyberwar to contend with. Malware is sprayed out into the world like buckshot.
Eddy Willems
Chapter 6. Today’s Threats
Abstract
Now that we have looked closely at the battlefield, we know who the good guys are and who the bad guys are, and we can therefore easily judge what is at stake, so we can address the most important issue. What is in store for us? What terrible cyberthreats are waiting out there for you, dear reader? What kind of cybercrime will you face, sooner or later?
Eddy Willems
Chapter 7. Malware Myths
Abstract
If this book was an elaborate banquet, we would now have reached a point between courses where we can enjoy a small and easily digested snack that gives us the best possible preparation for all the courses still to come. I am devoting this chapter to identifying the most common malware-related misconceptions and will explain why they belong to the world of “myths and fables.” You’ll be amazed at how many myths have arisen around the topic of malware.
Eddy Willems
Chapter 8. Tips for Consumers: How to Travel Safely on the Information Superhighway
Abstract
There are many hazards on the Information Superhighway: not just the potholes and tailbacks that hamper our digital communications, but the unwelcome attention of highwaymen and snoopers. Here are some tips and tools to make your Internet journey smoother and safer.
Eddy Willems
Chapter 9. Tips for Companies: Surviving on the Internet
Abstract
All the tips that we discussed in Chap. 8 also apply to companies. Here too, general principles apply, such as regularly updating software (including security software) and operating systems. Indeed, they are even more important in the corporate context, not only because more computers and system users are affected locally in the event of a successful attack or other damage, but also because the impact of malicious software and/or a possible corruption or loss of data can be far more far-reaching. But there are statutes and regulations that apply specifically to companies, or at any rate are less applicable to private individuals. That is why we consider these tips in a separate chapter.
Eddy Willems
Chapter 10. The Role of Government
Abstract
In the struggle against terrorists, cybercrime, and crime in general, governments and state agencies often rely on intelligence in the form of espionage. And more and more espionage (and counter-espionage) takes place online, as I have already extensively demonstrated in Chap. 4. In this chapter we’ll look at how espionage works on both sides of the divide between Good and Evil, embodying both sides of a single coin: Espionage can be associated with a cyberattack (and that may be what you first think of in terms of cyberespionage), but it’s also part of the way we defend against such attacks. This is not the least of good reasons that the role of espionage in both attack and defense will always give rise to controversy.
Eddy Willems
Chapter 11. The Media
Abstract
In a world where communication can be instantaneous and truth is sometimes buried under data, it is more important than ever to be able to distinguish between the 24-carat gold of reliable information from professional sources and the fool’s gold of misinformation and fake news. In this chapter, we look at the roles and risks of the media in Internet security.
Eddy Willems
Chapter 12. The Digital Future
Abstract
If you ask me what all the malware and other cyberdangers will bring us in the future, I can answer in one word: MORE. In essence, what we’ll be seeing is more of what we already have, though we can expect changes in format and even platform. Not only a continuation but an increase, both in the number of attacks and the potential for damage. Surely no one is so naïve as to seriously believe that cybercrime or cyberespionage will suddenly tail off because individual criminals or state-sponsored attackers have been identified? On the contrary: the number of those who turn their hands to malware and hacking will grow steadily. That’s why I believe that potential victims and malware hunters have ever greater challenges to face. And yet I am sure that we will always find solutions, even for future cyberdangers.
Eddy Willems
Chapter 13. Awakening: A Short Story
Abstract
The intention of this story is to outline my vision of what the digital world might look like in the year 2033, and what cyberdangers that year might bring. What might really happen in the near future? Will we have learned from our mistakes?
Eddy Willems
Metadaten
Titel
Cyberdanger
verfasst von
Eddy Willems
Copyright-Jahr
2019
Electronic ISBN
978-3-030-04531-9
Print ISBN
978-3-030-04530-2
DOI
https://doi.org/10.1007/978-3-030-04531-9