Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Table of Contents About the Authors
ANDREW COBURN ÉIREANN LEVERETT GORDON WOO
Acknowledgments CHAPTER 1: Counting the Costs of Cyber Attacks
1.1 ANATOMY OF A DATA EXFILTRATION ATTACK 1.2 A MODERN SCOURGE 1.3 CYBER CATASTROPHES 1.4 SOCIETAL CYBER THREATS 1.5 CYBER RISK 1.6 HOW MUCH DOES CYBER RISK COST OUR SOCIETY? ENDNOTES
CHAPTER 2: Preparing for Cyber Attacks
2.1 CYBER LOSS PROCESSES 2.2 DATA EXFILTRATION 2.3 CONTAGIOUS MALWARE INFECTION 2.4 DENIAL OF SERVICE ATTACKS 2.5 FINANCIAL THEFT 2.6 FAILURES OF COUNTERPARTIES OR SUPPLIERS ENDNOTES
CHAPTER 3: Cyber Enters the Physical World
3.1 A BRIEF HISTORY OF CYBER-PHYSICAL INTERACTIONS 3.2 HACKING ATTACKS ON CYBER-PHYSICAL SYSTEMS 3.3 COMPONENTS OF CYBER-PHYSICAL SYSTEMS 3.4 HOW TO SUBVERT CYBER-PHYSICAL SYSTEMS 3.5 HOW TO CAUSE DAMAGE REMOTELY 3.6 USING COMPROMISES TO TAKE CONTROL 3.7 OPERATING COMPROMISED SYSTEMS 3.8 EXPECT THE UNEXPECTED 3.9 SMART DEVICES AND THE INTERNET OF THINGS ENDNOTES
CHAPTER 4: Ghosts in the Code
4.1 ALL SOFTWARE HAS ERRORS 4.2 VULNERABILITIES, EXPLOITS, AND ZERO DAYS 4.3 COUNTING VULNERABILITIES 4.4 VULNERABILITY MANAGEMENT 4.5 INTERNATIONAL CYBER RESPONSE AND DEFENSE ENDNOTES
CHAPTER 5: Know Your Enemy
5.1 HACKERS 5.2 TAXONOMY OF THREAT ACTORS 5.3 THE INSIDER THREAT 5.4 THREAT ACTORS AND CYBER RISK 5.5 HACKONOMICS ENDNOTES
CHAPTER 6: Measuring the Cyber Threat
6.1 MEASUREMENT AND MANAGEMENT 6.2 CYBER THREAT METRICS 6.3 MEASURING THE THREAT FOR AN ORGANIZATION 6.4 THE LIKELIHOOD OF MAJOR CYBER ATTACKS ENDNOTES
CHAPTER 7: Rules, Regulations, and Law Enforcement
7.1 CYBER LAWS 7.2 US CYBER LAWS 7.3 EU GENERAL DATA PROTECTION REGULATION (GDPR) 7.4 REGULATION OF CYBER INSURANCE 7.5 A CHANGING LEGAL LANDSCAPE 7.6 COMPLIANCE AND LAW ENFORCEMENT 7.7 LAW ENFORCEMENT AND CYBER CRIME ENDNOTES
CHAPTER 8: The Cyber-Resilient Organization
8.1 CHANGING APPROACHES TO RISK MANAGEMENT 8.2 INCIDENT RESPONSE AND CRISIS MANAGEMENT 8.3 RESILIENCE ENGINEERING 8.4 ATTRIBUTES OF A CYBER-RESILIENT ORGANIZATION 8.5 INCIDENT RESPONSE PLANNING 8.6 RESILIENT SECURITY SOLUTIONS 8.7 FINANCIAL RESILIENCE ENDNOTES
CHAPTER 9: Cyber Insurance
9.1 BUYING CYBER INSURANCE 9.2 THE CYBER INSURANCE MARKET 9.3 CYBER CATASTROPHE RISK 9.4 MANAGING PORTFOLIOS OF CYBER INSURANCE 9.5 CYBER INSURANCE UNDERWRITING 9.6 CYBER INSURANCE AND RISK MANAGEMENT ENDNOTES
CHAPTER 10: Security Economics and Strategies
10.1 COST-EFFECTIVENESS OF SECURITY ENHANCEMENTS 10.2 CYBER SECURITY BUDGETS 10.3 SECURITY STRATEGIES FOR SOCIETY 10.4 STRATEGIES OF CYBER ATTACK 10.5 STRATEGIES OF NATIONAL CYBER DEFENSE ENDNOTES
CHAPTER 11: Ten Cyber Problems
11.1 SETTING PROBLEMS ENDNOTES
CHAPTER 12: Cyber Future
12.1 CYBERGEDDON 12.2 CYBERTOPIA 12.3 FUTURE TECHNOLOGY TRENDS 12.4 GETTING THE CYBER RISK FUTURE WE WANT ENDNOTES
References Index End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion