skip to content
Cyberdanger : understanding and guarding against cybercrime Preview this item
ClosePreview this item
Checking...

Cyberdanger : understanding and guarding against cybercrime

Author: Eddy Willems
Publisher: Cham, Switzerland : Springer, [2019]
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Printed edition:
Printed edition:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Eddy Willems
ISBN: 9783030045319 3030045315 3030045307 9783030045302 9783030045326 3030045323
OCLC Number: 1100471240
Description: 1 online resource.
Contents: Intro; Acknowledgments; Introduction; All Aboard?; My Youth and Technology; First Experiences, First PC; The Malware Train Had Left the Station; My Years as an Evangelist; Disclaimer; Contents; About the Author; Chapter 1: Thirty Years of Malware: A Short Outline; 1.1 What Is Malware?; 1.2 What Is a Virus?; 1.3 The First Generation; 1.4 Generation Internet; 1.5 The Mobile Generation; 1.6 Finally; Chapter 2: Malware Author Profiles; 2.1 The Graffiti Sprayer and Script Kiddies; 2.2 Cybercriminals; 2.3 Malicious by Ignorance, Not by Design; 2.4 The Authorities and Government Departments 2.5 And What About the Hacktivists?2.6 Gigabyte: Made in Belgium; 2.7 Virus Developers and Virus Hunters; Chapter 3: The Digital Underground Economy; 3.1 How Is the Digital Underground Economy Organized?; 3.2 Is Everything for Sale?; 3.3 How a Mass Attack Works: Botnets and Their Structure; 3.4 And What About the Victim?; 3.5 Conclusion: E-crime Is on the Rise; Chapter 4: From Cyberwar to Hacktivism; 4.1 Cyberwar; 4.1.1 The Cloud as a Battlefield?; 4.1.2 Stuxnet; 4.2 Cyberterrorism; 4.3 Hacktivism; 4.4 Cyberespionage; 4.4.1 Stuxnetś Relatives; 4.5 Last but Not Least 4.6 Some (Final) Final ThoughtsChapter 5: The Antivirus Companies; 5.1 The Manufacturer; 5.2 Nonprofit Organizations in the Fight Against Cybercrime; 5.2.1 CARO; 5.2.2 EICAR; 5.2.3 AMTSO; 5.2.4 The WildList; 5.2.5 Test Sites; 5.2.6 Other Organizations and Services; Chapter 6: Todayś Threats; 6.1 Botnets; 6.2 Ransomware; 6.3 Social Networks; 6.4 Portable Media; 6.5 Attack and This Time on Businesses!; 6.6 Mobile Targets; 6.7 Online Banking: Beware of the Man-in-the-Browser; 6.8 PUPs, PUS, and PUAs; 6.9 Cryptocurrency and Cryptojacking: Virtual Currency and Real Criminals Chapter 7: Malware Myths7.1 Myth 1: If I Do Not Notice Anything Suspicious on My Computer, It Is Not Infected; 7.2 Myth 2: There Is Absolutely No Need for Expensive Security Software. There Are Free Programs That Are At Least as Good!; 7.3 Myth 3: Most Malicious Software Is Sent as an Email Attachment; 7.4 Myth 4: My PC or Network Cannot Be Harmed by My Visiting a Website, If I Dont́ Download Anything; 7.5 Myth 5: Malware Is Most Commonly Downloaded Through Peer-to-Peer and Torrent Sites 7.6 Myth 6: Visiting a Porn Site Is More Likely to Result in Being Attacked by Malware than Looking at a Page About Equestrian...7.7 Myth 7: If I Do Not Open an Infected File, It Can't Do Any Harm; 7.8 Myth 8: Most Malicious Software Is Distributed via USB Sticks; 7.9 Myth 9: I Can Save Myself the Expense of Security Software or Hardware, Because I Know My Way Around and Only Visit Safe W...; 7.10 Myth 10: My PC Holds No Valuable Data-So Why Would Anyone Attack It?; 7.11 Myth 11: My PC Doesnt́ Run Windows, So It Is Quite Safe; 7.12 Myth 12: Malware Is Written by Antivirus Vendors
Other Titles: Cybergevaar.
Responsibility: Eddy Willems.

Abstract:

He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1100471240> # Cyberdanger : understanding and guarding against cybercrime
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    bgn:translationOfWork <http://www.worldcat.org/title/-/oclc/1100471240#CreativeWork/unidentifiedOriginalWork> ; # Cybergevaar.
    library:oclcnum "1100471240" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/sz> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/5508716057#Topic/cyberterrorism_prevention> ; # Cyberterrorism--Prevention
    schema:about <http://dewey.info/class/363.325/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/5508716057#Topic/computer_crimes> ; # Computer crimes
    schema:about <http://experiment.worldcat.org/entity/work/data/5508716057#Topic/terrorism_prevention> ; # Terrorism--Prevention
    schema:about <http://experiment.worldcat.org/entity/work/data/5508716057#Topic/business_&_economics_infrastructure> ; # BUSINESS & ECONOMICS / Infrastructure
    schema:about <http://experiment.worldcat.org/entity/work/data/5508716057#Topic/social_science_general> ; # SOCIAL SCIENCE / General
    schema:author <http://experiment.worldcat.org/entity/work/data/5508716057#Person/willems_eddy_1962> ; # Eddy Willems
    schema:bookFormat schema:EBook ;
    schema:datePublished "2019" ;
    schema:description "Intro; Acknowledgments; Introduction; All Aboard?; My Youth and Technology; First Experiences, First PC; The Malware Train Had Left the Station; My Years as an Evangelist; Disclaimer; Contents; About the Author; Chapter 1: Thirty Years of Malware: A Short Outline; 1.1 What Is Malware?; 1.2 What Is a Virus?; 1.3 The First Generation; 1.4 Generation Internet; 1.5 The Mobile Generation; 1.6 Finally; Chapter 2: Malware Author Profiles; 2.1 The Graffiti Sprayer and Script Kiddies; 2.2 Cybercriminals; 2.3 Malicious by Ignorance, Not by Design; 2.4 The Authorities and Government Departments"@en ;
    schema:description "This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It's also a valuable introduction for the general reader who wants to learn about cybersecurity."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/5508716057> ; # Cybergevaar.
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/5508716057#CreativeWork/> ;
    schema:name "Cyberdanger : understanding and guarding against cybercrime"@en ;
    schema:productID "1100471240" ;
    schema:url <https://link.springer.com/10.1007/978-3-030-04531-9> ;
    schema:url <https://doi.org/10.1007/978-3-030-04531-9> ;
    schema:url <http://ezsecureaccess.balamand.edu.lb/login?url=https://doi.org/10.1007/978-3-030-04531-9> ;
    schema:url <http://ezaccess.libraries.psu.edu/login?url=https://doi.org/10.1007/978-3-030-04531-9> ;
    schema:url <http://public.eblib.com/choice/PublicFullRecord.aspx?p=5771309> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2120247> ;
    schema:workExample <http://worldcat.org/isbn/9783030045302> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-030-04531-9> ;
    schema:workExample <http://worldcat.org/isbn/9783030045319> ;
    schema:workExample <http://worldcat.org/isbn/9783030045326> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB990966> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1100471240> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/5508716057#Person/willems_eddy_1962> # Eddy Willems
    a schema:Person ;
    schema:birthDate "1962" ;
    schema:familyName "Willems" ;
    schema:givenName "Eddy" ;
    schema:name "Eddy Willems" ;
    .

<http://experiment.worldcat.org/entity/work/data/5508716057#Topic/business_&_economics_infrastructure> # BUSINESS & ECONOMICS / Infrastructure
    a schema:Intangible ;
    schema:name "BUSINESS & ECONOMICS / Infrastructure"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5508716057#Topic/cyberterrorism_prevention> # Cyberterrorism--Prevention
    a schema:Intangible ;
    schema:name "Cyberterrorism--Prevention"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5508716057#Topic/social_science_general> # SOCIAL SCIENCE / General
    a schema:Intangible ;
    schema:name "SOCIAL SCIENCE / General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/5508716057#Topic/terrorism_prevention> # Terrorism--Prevention
    a schema:Intangible ;
    schema:name "Terrorism--Prevention"@en ;
    .

<http://worldcat.org/entity/work/data/5508716057#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1100471240> ; # Cyberdanger : understanding and guarding against cybercrime
    .

<http://worldcat.org/entity/work/id/5508716057> # Cybergevaar.
    schema:name "Cybergevaar." ;
    .

<http://worldcat.org/isbn/9783030045302>
    a schema:ProductModel ;
    schema:isbn "3030045307" ;
    schema:isbn "9783030045302" ;
    .

<http://worldcat.org/isbn/9783030045319>
    a schema:ProductModel ;
    schema:isbn "3030045315" ;
    schema:isbn "9783030045319" ;
    .

<http://worldcat.org/isbn/9783030045326>
    a schema:ProductModel ;
    schema:isbn "3030045323" ;
    schema:isbn "9783030045326" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.