Cyberdanger understanding and guarding against cybercrime /

This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam,...

Full description

Uniform Title: Cybergevaar. English
Main Author: Willems, Eddy, 1962-
Other Authors: SpringerLink (Online service)
Format: eBook
Language: English
Dutch
Published: Cham, Switzerland : Springer, [2019]
Physical Description: 1 online resource.
Subjects:
LEADER 07890cam a2200997 i 4500
001 1100471240
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cnu|||unuuu
008 190508s2019 sz o 000 0 eng d
015 |a GBB990966  |2 bnb 
016 7 |a 019397963  |2 Uk 
019 |a 1107191250  |a 1110801471  |a 1115081404  |a 1122812104  |a 1126149804  |a 1156396473  |a 1162803373 
020 |a 9783030045319  |q (electronic bk.) 
020 |a 3030045315  |q (electronic bk.) 
020 |a 3030045307 
020 |a 9783030045302 
020 |a 9783030045326  |q (print) 
020 |a 3030045323 
020 |z 9783030045302 
024 7 |a 10.1007/978-3-030-04531-9  |2 doi 
035 |a (OCoLC)1100471240  |z (OCoLC)1107191250  |z (OCoLC)1110801471  |z (OCoLC)1115081404  |z (OCoLC)1122812104  |z (OCoLC)1126149804  |z (OCoLC)1156396473  |z (OCoLC)1162803373 
037 |a com.springer.onix.9783030045319  |b Springer Nature 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d EBLCP  |d GW5XE  |d UKMGB  |d OCLCF  |d UPM  |d VT2  |d RCJ  |d LEATE  |d OCLCQ  |d UKAHL  |d UNITY  |d GGVRL  |d OCLCO  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ  |d AUD  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
041 1 |a eng  |h dut 
049 |a COM6 
050 4 |a HV6773.15.C97 
072 7 |a BUS  |x 032000  |2 bisacsh 
072 7 |a SOC  |x 000000  |2 bisacsh 
072 7 |a UR  |2 bicssc 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 363.325  |2 23 
100 1 |a Willems, Eddy,  |d 1962-  |e author. 
240 1 0 |a Cybergevaar.  |l English. 
245 1 0 |a Cyberdanger :  |b understanding and guarding against cybercrime /  |c Eddy Willems. 
264 1 |a Cham, Switzerland :  |b Springer,  |c [2019] 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file. 
347 |b PDF. 
588 |a Online resource; title from PDF title page (EBSCO, viewed May 9, 2019). 
505 0 |a Intro; Acknowledgments; Introduction; All Aboard?; My Youth and Technology; First Experiences, First PC; The Malware Train Had Left the Station; My Years as an Evangelist; Disclaimer; Contents; About the Author; Chapter 1: Thirty Years of Malware: A Short Outline; 1.1 What Is Malware?; 1.2 What Is a Virus?; 1.3 The First Generation; 1.4 Generation Internet; 1.5 The Mobile Generation; 1.6 Finally; Chapter 2: Malware Author Profiles; 2.1 The Graffiti Sprayer and Script Kiddies; 2.2 Cybercriminals; 2.3 Malicious by Ignorance, Not by Design; 2.4 The Authorities and Government Departments. 
505 8 |a 2.5 And What About the Hacktivists?2.6 Gigabyte: Made in Belgium; 2.7 Virus Developers and Virus Hunters; Chapter 3: The Digital Underground Economy; 3.1 How Is the Digital Underground Economy Organized?; 3.2 Is Everything for Sale?; 3.3 How a Mass Attack Works: Botnets and Their Structure; 3.4 And What About the Victim?; 3.5 Conclusion: E-crime Is on the Rise; Chapter 4: From Cyberwar to Hacktivism; 4.1 Cyberwar; 4.1.1 The Cloud as a Battlefield?; 4.1.2 Stuxnet; 4.2 Cyberterrorism; 4.3 Hacktivism; 4.4 Cyberespionage; 4.4.1 Stuxnetś Relatives; 4.5 Last but Not Least. 
505 8 |a 4.6 Some (Final) Final ThoughtsChapter 5: The Antivirus Companies; 5.1 The Manufacturer; 5.2 Nonprofit Organizations in the Fight Against Cybercrime; 5.2.1 CARO; 5.2.2 EICAR; 5.2.3 AMTSO; 5.2.4 The WildList; 5.2.5 Test Sites; 5.2.6 Other Organizations and Services; Chapter 6: Todayś Threats; 6.1 Botnets; 6.2 Ransomware; 6.3 Social Networks; 6.4 Portable Media; 6.5 Attack and This Time on Businesses!; 6.6 Mobile Targets; 6.7 Online Banking: Beware of the Man-in-the-Browser; 6.8 PUPs, PUS, and PUAs; 6.9 Cryptocurrency and Cryptojacking: Virtual Currency and Real Criminals. 
505 8 |a Chapter 7: Malware Myths7.1 Myth 1: If I Do Not Notice Anything Suspicious on My Computer, It Is Not Infected; 7.2 Myth 2: There Is Absolutely No Need for Expensive Security Software. There Are Free Programs That Are At Least as Good!; 7.3 Myth 3: Most Malicious Software Is Sent as an Email Attachment; 7.4 Myth 4: My PC or Network Cannot Be Harmed by My Visiting a Website, If I Dont́ Download Anything; 7.5 Myth 5: Malware Is Most Commonly Downloaded Through Peer-to-Peer and Torrent Sites. 
505 8 |a 7.6 Myth 6: Visiting a Porn Site Is More Likely to Result in Being Attacked by Malware than Looking at a Page About Equestrian ... 7.7 Myth 7: If I Do Not Open an Infected File, It Can't Do Any Harm; 7.8 Myth 8: Most Malicious Software Is Distributed via USB Sticks; 7.9 Myth 9: I Can Save Myself the Expense of Security Software or Hardware, Because I Know My Way Around and Only Visit Safe W ... ; 7.10 Myth 10: My PC Holds No Valuable Data-So Why Would Anyone Attack It?; 7.11 Myth 11: My PC Doesnt́ Run Windows, So It Is Quite Safe; 7.12 Myth 12: Malware Is Written by Antivirus Vendors. 
520 |a This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It's also a valuable introduction for the general reader who wants to learn about cybersecurity. 
650 0 |a Cyberterrorism  |x Prevention. 
650 0 |a Terrorism  |x Prevention. 
650 0 |a Computer crimes. 
650 6 |a Terrorisme  |x Prévention. 
650 6 |a Criminalité informatique. 
650 7 |a BUSINESS & ECONOMICS  |x Infrastructure.  |2 bisacsh. 
650 7 |a SOCIAL SCIENCE  |x General.  |2 bisacsh. 
650 7 |a Computer crimes.  |2 fast. 
650 7 |a Cyberterrorism  |x Prevention.  |2 fast. 
650 7 |a Terrorism  |x Prevention.  |2 fast. 
710 2 |a SpringerLink (Online service) 
776 0 8 |i Printed edition:  |z 9783030045302. 
776 0 8 |i Printed edition:  |z 9783030045326. 
907 |a .b59648612  |b multi  |c -  |d 190701  |e 240401 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g sz   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Overnight, in 2023.02 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Overnight 07/2019 
933 |a Marcive found issue: "240 10   |a Cybergevaar.  |l English" 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2023.02 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2019.08 
995 0 0 |a OCLC offline update by CMU and loaded with m2btab.elec in 2019.07 
995 |a Loaded with m2btab.auth in 2021.07 
995 |a Loaded with m2btab.auth in 2024.03 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150624499  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-030-04531-9  |3 SpringerLink  |z Click here for access