ABSTRACT

Introduction ........................................................................................................ 122 Entry-Level Risks and Vulnerabilities ............................................................. 123

Mobile Device Vulnerabilities ...................................................................... 123 Industrial Control Computers and Indirect Data Connections .............. 124 Insider Threat ................................................................................................. 124 Minimalist Definition as an Offshoot of White-Collar Crime and New Typologies ...................................................................................... 125

Basic Stratagem: Electronic Online Approach to a Potential Victim .......... 126 The E-Mail Phishing Scam ........................................................................... 126 Theft of Digital Certificates .......................................................................... 127 Hacking and Hackers .................................................................................... 127 Hacker Methods ............................................................................................. 128 Cyberattacks and DDoS Attacks .................................................................. 130

Hacking Data Breaches .......................................................................................131 Preventing and Combating Cybercrime ......................................................... 132

Insider Prevention ......................................................................................... 132 Combating Cyberattacks ................................................................................... 133

Cybersecurity ................................................................................................. 133 Difficulties of Stopping Hacker Cyberattacks ................................................. 134

Installation of Specialized On-Premises Equipment ................................ 134 Cybersecurity Provision by Your Internet Service Provider .................... 135 Security Provision by Cloud Security Providers ....................................... 136

Concluding Remarks ......................................................................................... 137 References ............................................................................................................ 138

Abstract Given modern societies’ increased reliance on borderless and decentralized information technologies (ITs), cyberspace has been identified as an easy target for organized criminals, criminal hackers (crackers), hacktivists, governments themselves, or even terrorist networks and for the perpetration of a number of wide-ranging illegal activities. Gone are the days when encryption was foolproof, e-commerce was safe, gaming was just for fun, war was fought by actual people, and the Internet was safely in the hands of responsible entities. The control over the Internet has become free for all, and nothing is hack-proof with old cybersecurity models collapsing. Information security has become an increasingly critical concern for organizations of all kinds. Trends, such as device mobility (of smartphones, tablets/iPads, and notebooks), cloud computing, consumerization (online shopping), and flexi-work or bring your own device (BYOD) to work, mean that more people are accessing an organization’s applications and data from more places and in more ways than ever before. This chapter examines the cybercrime basics, the anatomy of cyberattacks as launched against networks by professional hackers/crackers, and then turns to looking at the enormous problems of implementing cybersecurity in an ordinary organization and finally the current threats and vulnerabilities of mobile devices and the growing practice of BYOD to work.