ABSTRACT

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable.

Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike.

The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at – revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

chapter Chapter 1|4 pages

Introduction

chapter Chapter 2|20 pages

Web and network basics

chapter Chapter 3|24 pages

Cryptography

chapter Chapter 4|24 pages

Hacking overview

chapter Chapter 5|22 pages

Packet analysis and penetration testing

chapter Chapter 6|14 pages

Social engineering

chapter Chapter 7|14 pages

Cyber countermeasures

chapter Chapter 8|30 pages

Incident response and mitigation

chapter Chapter 9|20 pages

Digital forensics

chapter Chapter 10|8 pages

Special topics

Countersurveillance in a cyber-intrusive world

chapter Chapter 11|18 pages

Special topics

Securing the Internet of Things (IoT)