ABSTRACT

This chapter presents a series of case studies and examples of cyberbreaches and attacks. The examples serve as a basis for the discussion of the later chapters and provide the context of why human dimensions in cybersecurity are so important. The cases deal with issues ranging from types of attacks (Distributed Denial of Service (DDoS) Sections 2.1 and 2.2, and business email compromise (Business Email Compromise (BEC)) (Section 2.3)) to issues of insider threats, misuse of private information (such as Cambridge Analytica in Section 2.8), and technical issues such as Transport Layer Security (TLS) weaknesses Section 2.9 (beware the use of web filters). We also examine how certain states have an activist role in cybersecurity, which matches that of state security and how this may affect companies wishing to business therein. There is also a situation that if the public becomes too concerned about cybersecurity and privacy they may drop out of digital engagement, even with their own online health records, which can help them and save both them and the state considerable money. We also discuss the various methods used by hostile states, cybercriminals, and activists to gain access to crucial systems and data. Our first case study deals with an increasingly common and disruptive attack, used by states, DDoS, Hacktivists, and other cybercriminals and possibly rogue states.