Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far beyond enumerating past cases and summarising legal or regulatory requirements. He describes in plain, non-technical language how cyber crime has evolved and the nature of the very latest threats. He confronts issues that are not addressed by codified rules and practice guidelines, supporting this with over 30 valuable illustrations and tables. Written for the non-technical layman and the high tech risk manager alike, the book also explores countermeasures, penetration testing, best practice principles, cyber conflict and future challenges. A discussion of Web 2.0 risks delves into the very real questions facing policy makers, along with the pros and cons of open source data. In a chapter on Digital Intelligence readers are provided with an exhaustive guide to practical, effective and ethical online investigations. Cyber Crime, Security and Digital Intelligence is an important work of great relevance in today's interconnected world and one that nobody with an interest in either risk or technology should be without.

part |6 pages

Part I The Cybercrime Challenge

chapter 1|12 pages

Threats to Key Sectors

chapter 2|8 pages

Cyber Security Fundamentals

chapter 3|46 pages

Cyber Attack Fundamentals

chapter 4|26 pages

Organised Cyber Attacks

chapter 5|14 pages

Cloud Risks

chapter 6|14 pages

Web 2.0 Risks

chapter 7|10 pages

Cyber Security Threat Actors

chapter 8|16 pages

Common Vulnerabilities

part |2 pages

Part II The Cyber Security Response

chapter 9|18 pages

Cyber Security Control Frameworks

chapter 10|26 pages

Cyber Security

chapter 11|32 pages

Digital Intelligence

chapter 12|12 pages

The Future of Cyber Security