ABSTRACT

This chapter concerns cyber threats. A thorough discussion of the necessary explanation is included. The various types of risks are discussed. The concept of “cyberattack” is introduced. The Kill Chain and the MITRE models are used to usefully describe and help to reason about how cyberattacks are happening. Threat actors are discussed, along with the initial discussion of cyber tools, vulnerabilities, and also how to secure one’s systems. The importance of social engineering is highlighted, as well as the crucial concepts of an exploit. As an added bonus it discusses the implications of 20-year-old cybersecurity bugs existing in widely used systems.