Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Table of Contents
About the Authors
ANDREW COBURN
ÉIREANN LEVERETT
GORDON WOO
Acknowledgments
CHAPTER 1: Counting the Costs of Cyber Attacks
1.1 ANATOMY OF A DATA EXFILTRATION ATTACK
1.2 A MODERN SCOURGE
1.3 CYBER CATASTROPHES
1.4 SOCIETAL CYBER THREATS
1.5 CYBER RISK
1.6 HOW MUCH DOES CYBER RISK COST OUR SOCIETY?
ENDNOTES
CHAPTER 2: Preparing for Cyber Attacks
2.1 CYBER LOSS PROCESSES
2.2 DATA EXFILTRATION
2.3 CONTAGIOUS MALWARE INFECTION
2.4 DENIAL OF SERVICE ATTACKS
2.5 FINANCIAL THEFT
2.6 FAILURES OF COUNTERPARTIES OR SUPPLIERS
ENDNOTES
CHAPTER 3: Cyber Enters the Physical World
3.1 A BRIEF HISTORY OF CYBER-PHYSICAL INTERACTIONS
3.2 HACKING ATTACKS ON CYBER-PHYSICAL SYSTEMS
3.3 COMPONENTS OF CYBER-PHYSICAL SYSTEMS
3.4 HOW TO SUBVERT CYBER-PHYSICAL SYSTEMS
3.5 HOW TO CAUSE DAMAGE REMOTELY
3.6 USING COMPROMISES TO TAKE CONTROL
3.7 OPERATING COMPROMISED SYSTEMS
3.8 EXPECT THE UNEXPECTED
3.9 SMART DEVICES AND THE INTERNET OF THINGS
ENDNOTES
CHAPTER 4: Ghosts in the Code
4.1 ALL SOFTWARE HAS ERRORS
4.2 VULNERABILITIES, EXPLOITS, AND ZERO DAYS
4.3 COUNTING VULNERABILITIES
4.4 VULNERABILITY MANAGEMENT
4.5 INTERNATIONAL CYBER RESPONSE AND DEFENSE
ENDNOTES
CHAPTER 5: Know Your Enemy
5.1 HACKERS
5.2 TAXONOMY OF THREAT ACTORS
5.3 THE INSIDER THREAT
5.4 THREAT ACTORS AND CYBER RISK
5.5 HACKONOMICS
ENDNOTES
CHAPTER 6: Measuring the Cyber Threat
6.1 MEASUREMENT AND MANAGEMENT
6.2 CYBER THREAT METRICS
6.3 MEASURING THE THREAT FOR AN ORGANIZATION
6.4 THE LIKELIHOOD OF MAJOR CYBER ATTACKS
ENDNOTES
CHAPTER 7: Rules, Regulations, and Law Enforcement
7.1 CYBER LAWS
7.2 US CYBER LAWS
7.3 EU GENERAL DATA PROTECTION REGULATION (GDPR)
7.4 REGULATION OF CYBER INSURANCE
7.5 A CHANGING LEGAL LANDSCAPE
7.6 COMPLIANCE AND LAW ENFORCEMENT
7.7 LAW ENFORCEMENT AND CYBER CRIME
ENDNOTES
CHAPTER 8: The Cyber-Resilient Organization
8.1 CHANGING APPROACHES TO RISK MANAGEMENT
8.2 INCIDENT RESPONSE AND CRISIS MANAGEMENT
8.3 RESILIENCE ENGINEERING
8.4 ATTRIBUTES OF A CYBER-RESILIENT ORGANIZATION
8.5 INCIDENT RESPONSE PLANNING
8.6 RESILIENT SECURITY SOLUTIONS
8.7 FINANCIAL RESILIENCE
ENDNOTES
CHAPTER 9: Cyber Insurance
9.1 BUYING CYBER INSURANCE
9.2 THE CYBER INSURANCE MARKET
9.3 CYBER CATASTROPHE RISK
9.4 MANAGING PORTFOLIOS OF CYBER INSURANCE
9.5 CYBER INSURANCE UNDERWRITING
9.6 CYBER INSURANCE AND RISK MANAGEMENT
ENDNOTES
CHAPTER 10: Security Economics and Strategies
10.1 COST-EFFECTIVENESS OF SECURITY ENHANCEMENTS
10.2 CYBER SECURITY BUDGETS
10.3 SECURITY STRATEGIES FOR SOCIETY
10.4 STRATEGIES OF CYBER ATTACK
10.5 STRATEGIES OF NATIONAL CYBER DEFENSE
ENDNOTES
CHAPTER 11: Ten Cyber Problems
11.1 SETTING PROBLEMS
ENDNOTES
CHAPTER 12: Cyber Future
12.1 CYBERGEDDON
12.2 CYBERTOPIA
12.3 FUTURE TECHNOLOGY TRENDS
12.4 GETTING THE CYBER RISK FUTURE WE WANT
ENDNOTES
References
Index
End User License Agreement
← Prev
Back
Next →
← Prev
Back
Next →