Foreword |
|
xiii | |
Authors |
|
xv | |
1 Digital world |
|
1 | (16) |
|
|
1 | (3) |
|
|
1 | (2) |
|
|
3 | (1) |
|
|
4 | (5) |
|
|
4 | (1) |
|
|
5 | (2) |
|
|
7 | (2) |
|
|
9 | (1) |
|
1.3 Challenges of digital life |
|
|
9 | (4) |
|
|
10 | (1) |
|
1.3.1.1 Personal identifiable indicators |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
1.4 Digital mindset approach |
|
|
13 | (2) |
|
|
15 | (2) |
2 It is your money |
|
17 | (20) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (2) |
|
|
20 | (1) |
|
2.5 Data-driven investments |
|
|
20 | (1) |
|
2.6 Customer engagement and support |
|
|
20 | (1) |
|
2.7 Challenges with banking digitisation |
|
|
21 | (1) |
|
2.8 Case study: Social engineering attacks |
|
|
22 | (2) |
|
|
24 | (5) |
|
|
24 | (2) |
|
2.9.2 Using standard features |
|
|
26 | (1) |
|
2.9.3 Using technical hacks |
|
|
26 | (1) |
|
|
27 | (2) |
|
2.10 Case study: data breach |
|
|
29 | (3) |
|
2.11 Case study: system vulnerabilities |
|
|
32 | (3) |
|
|
35 | (2) |
3 Your socially, social media |
|
37 | (20) |
|
3.1 The beginning of viral worlds |
|
|
37 | (1) |
|
3.2 The rise of campaigns |
|
|
37 | (1) |
|
|
38 | (1) |
|
3.3 URL shorteners lengthen the problem |
|
|
38 | (1) |
|
3.4 What if we had the power to verify URLs? |
|
|
39 | (1) |
|
3.5 Online buying and selling |
|
|
40 | (9) |
|
3.5.1 Online selling via social media |
|
|
41 | (1) |
|
|
42 | (1) |
|
3.5.3 Abusing online forums and digital payments |
|
|
43 | (2) |
|
3.5.4 Say hello to fraudsters |
|
|
45 | (1) |
|
3.5.5 Dumpster diving and the tale of your ID |
|
|
46 | (1) |
|
3.5.6 Transaction trick begins |
|
|
47 | (14) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
3.6 Importance of privacy settings in social media profiles |
|
|
49 | (2) |
|
3.7 Forwards take you backwards |
|
|
51 | (1) |
|
3.8 Messages and campaigns: The one with more gains |
|
|
52 | (2) |
|
3.9 Tring, tring: The phone scam |
|
|
54 | (2) |
|
|
56 | (1) |
4 Knock, knock, anybody there? |
|
57 | (20) |
|
4.1 Email, malware, and phishing: The deadly trio |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
4.4 A sneak peek into free watching |
|
|
58 | (1) |
|
4.5 Delivery of malware and modes of delivery |
|
|
59 | (1) |
|
4.6 Email the preferred partner for malware and phishing |
|
|
60 | (1) |
|
4.7 Email and phishing a better story than twilight |
|
|
60 | (1) |
|
4.8 Know your URL example |
|
|
61 | (2) |
|
4.8.1 What is a domain name or a URL? |
|
|
62 | (1) |
|
4.8.2 The typosquatting episode |
|
|
62 | (1) |
|
4.9 How to identify phishing and tricks: Typosquatting and green lock SSL |
|
|
63 | (3) |
|
4.9.1 What is the green lock symbol? |
|
|
63 | (1) |
|
4.9.2 Food for brain, let us test! |
|
|
64 | (2) |
|
4.10 Email dropping malware: how it tricks one and either steals or drops malware |
|
|
66 | (4) |
|
4.10.1 The rise of document and pdf malware |
|
|
68 | (1) |
|
4.10.2 What is this macro? |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
4.11 Real-world scenes: Exercise and case study |
|
|
70 | (5) |
|
|
71 | (4) |
|
|
75 | (2) |
5 Power up and ready to strike |
|
77 | (28) |
|
|
77 | (2) |
|
|
79 | (2) |
|
5.3 Macro: The micro-executioner |
|
|
81 | (3) |
|
|
84 | (5) |
|
5.5 Payload & parked domains, loading |
|
|
89 | (1) |
|
|
90 | (2) |
|
5.7 PDF- graphically malicious |
|
|
92 | (2) |
|
S.8 Image EXIF header malware |
|
|
94 | (4) |
|
|
98 | (1) |
|
|
99 | (2) |
|
5.11 Exfiltration of malware data using steganography: Sodinokibi ransomware |
|
|
101 | (2) |
|
|
103 | (2) |
6 The guardians of the Internet |
|
105 | (24) |
|
|
106 | (1) |
|
6.2 Multiple personality disorder of IDS |
|
|
106 | (1) |
|
|
107 | (9) |
|
6.4 Obfuscation: The magic trick that attackers follow to evade |
|
|
116 | (8) |
|
6.4.1 Case study: Screen saver that is not a saver! |
|
|
120 | (4) |
|
|
124 | (2) |
|
|
126 | (3) |
7 Need of the hour: The tech fundamentals |
|
129 | (26) |
|
7.1 Operating systems: A bigger picture |
|
|
129 | (1) |
|
7.2 File systems: Linux/Unix file systems |
|
|
130 | (2) |
|
7.3 Processes: How and why is it important? |
|
|
132 | (8) |
|
7.3.1 The process control block: PCB in a nutshell |
|
|
132 | (3) |
|
|
135 | (3) |
|
7.3.3 Process states: An analysis |
|
|
138 | (2) |
|
7.3.3.1 State transitions |
|
|
139 | (1) |
|
7.4 Shell scripting: A quick visit |
|
|
140 | (10) |
|
7.4.1 Syntaxes and variables used in shell scripting |
|
|
141 | (2) |
|
7.4.2 Arithmetical operations |
|
|
143 | (2) |
|
7.4.3 Conditional statements used in shell |
|
|
145 | (4) |
|
7.4.4 Special symbols used in shell |
|
|
149 | (1) |
|
7.5 HTTP (HyperText Transfer Protocol) |
|
|
150 | (3) |
|
7.5.1 HTTP request message |
|
|
150 | (1) |
|
7.5.2 HTTP response format |
|
|
151 | (2) |
|
|
153 | (2) |
8 It is your data |
|
155 | (22) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
8.2 Why is your data interesting |
|
|
156 | (6) |
|
|
157 | (1) |
|
8.2.2 Financial interests |
|
|
157 | (1) |
|
|
158 | (1) |
|
8.2.4 Digital advertising |
|
|
159 | (1) |
|
8.2.5 Disruption or to do harm |
|
|
160 | (1) |
|
8.2.6 Political gains or dominance |
|
|
161 | (1) |
|
8.3 How can you lose your data? |
|
|
162 | (2) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
8.4 What can you do to secure your data? |
|
|
164 | (7) |
|
|
165 | (1) |
|
8.4.2 Identity and access control |
|
|
166 | (1) |
|
|
166 | (1) |
|
8.4.4 Secure infrastructure |
|
|
167 | (3) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
8.4.6 Incident management |
|
|
170 | (1) |
|
|
171 | (4) |
|
|
171 | (1) |
|
|
172 | (1) |
|
8.5.3 More data regulations |
|
|
172 | (1) |
|
|
173 | (1) |
|
8.5.5 More people using data |
|
|
174 | (1) |
|
|
175 | (2) |
9 Sensors, software, and severities |
|
177 | (22) |
|
|
177 | (5) |
|
9.1.1 Device capabilities |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
9.1.5 Newer business models |
|
|
181 | (1) |
|
|
182 | (4) |
|
|
183 | (1) |
|
9.2.2 Connected transportation |
|
|
183 | (1) |
|
|
184 | (1) |
|
9.2.4 Connected healthcare |
|
|
185 | (1) |
|
9.2.5 Connected manufacturing |
|
|
185 | (1) |
|
9.2.6 Connected agriculture |
|
|
185 | (1) |
|
|
186 | (1) |
|
9.3 Challenges of security in IoT |
|
|
186 | (3) |
|
9.3.1 Unsophisticated devices |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
9.4 IoT breaches and attacks |
|
|
189 | (3) |
|
|
189 | (2) |
|
9.4.2 Remote vehicle access |
|
|
191 | (1) |
|
9.5 How to protect yourself |
|
|
192 | (2) |
|
9.5.1 IoT security standards |
|
|
192 | (2) |
|
9.5.2 Mitigating network-based attacks: MUD |
|
|
194 | (1) |
|
9.6 Stay connected and stay safe |
|
|
194 | (3) |
|
|
197 | (2) |
10 The cyber laws |
|
199 | (8) |
|
10.1 What exactly is cyber LAW? |
|
|
199 | (1) |
|
10.2 The inclusions: Cybercrime and cybersecurity |
|
|
199 | (1) |
|
10.3 The categories: Cybercrimes |
|
|
200 | (2) |
|
|
202 | (1) |
|
10.5 The intellectual property aspect |
|
|
202 | (2) |
|
10.6 The personal data protection bill, 2019 |
|
|
204 | (1) |
|
|
205 | (2) |
11 How to build a career as a digital detective |
|
207 | (18) |
|
|
207 | (12) |
|
11.1.1 Security analyst/information security analyst |
|
|
208 | (1) |
|
|
208 | (1) |
|
11.1.3 Security architect |
|
|
209 | (1) |
|
11.1.4 PKI analyst/cryptographer |
|
|
210 | (1) |
|
|
210 | (1) |
|
11.1.6 Vulnerability assessor |
|
|
211 | (1) |
|
11.1.7 Security researcher |
|
|
211 | (1) |
|
|
212 | (1) |
|
11.1.9 SOC analyst/investigator |
|
|
213 | (1) |
|
11.1.10 Computer security incident responder |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
11.1.13 Information security manager |
|
|
216 | (1) |
|
11.1.14 Chief privacy officer/data privacy officer |
|
|
217 | (1) |
|
11.1.15 Chief information security officer |
|
|
218 | (1) |
|
11.2 Industry certifications |
|
|
219 | (6) |
|
|
219 | (3) |
|
11.2.1.1 CISSP: Certified information systems security professional |
|
|
220 | (1) |
|
11.2.1.2 CCSP: Certified cloud security professional |
|
|
221 | (1) |
|
|
222 | (2) |
|
11.2.2.1 CISA: Certified information systems auditor |
|
|
222 | (1) |
|
11.2.2.2 CRISC: Certified in risk and information systems control |
|
|
222 | (1) |
|
11.2.2.3 CISM: Certified information security manager |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
Bibliography |
|
225 | (2) |
Index |
|
227 | |