• Login or Register
  •  
    • Logout
Orient Blackswan Private Limited
  • Catalogues
    • School Education
    • Test Prep & Competitive Examinations
    • Higher Education
      • Humanities and Social Science
        • Anthropology / Ethnography
        • Comparative Literature
        • Culture Studies
        • Dalit Studies
        • Development Studies
        • Economics
        • Education
        • Environment and Sustainability Studies
        • Film Studies
        • Gender and Women’s Studies
        • Geography
        • Health Studies
        • History
        • Hospitality Studies and Home Science
        • Human Rights
        • International Relations
        • Language and Linguistics
        • Law
        • Literature and Literary Criticism
        • Migration Studies
        • Policy Studies
        • Political Science
        • Public Administration
        • Sociology
        • Translation Studies
      • Indian Languages
        • Bangla
        • Gujarati
        • Hindi
        • Kannada
        • Marathi
        • Nepali
        • Odia
        • Tamil
      • People's Linguistic Survey of India (PLSI)
      • Science, Technology, Medicine and Management
        • Ayurveda
        • Biotechnology
        • Business and Management
        • Computer Science
        • Engineering & Technology
        • Environment and Biodiversity
        • Mathematics
        • Medical and Paramedical
        • Physics and Chemistry
        • Popular Science
    • General Books
      • Atlas
      • Children's Books
      • Cookery
      • General Interest
      • Life Writing
      • Literature in Translation
      • Media Studies
      • Reference
    • Professional Development
    • Download Catalogues
    • Recommendation Form
  • e-Books
  • Events
  • About Us
    • Our Company
    • Our Network
    • Associate Imprints
    • Social Responsibility
      • Act
      • Projects
    • Investors
      • Information for Shareholders
      • Annual Return Form MGT-7
    • Work with Us
    • Publish with Us
    • Contact Us
  • More
    • Open Access
    • Need Help ?
0 items - $0.00 0
Booklovers Close
  • Catalogues
    • School Education
    • Test Prep &Competitive Examinations
    • Higher Education
      • Humanities and Social Science
        • Anthropology / Ethnography
        • Comparative Literature
        • Culture Studies
        • Dalit Studies
        • Development Studies
        • Economics
        • Education
        • Environment and Sustainability Studies
        • Film Studies
        • Gender and Women’s Studies
        • Geography
        • Health Studies
        • History
        • Hospitality Studies and Home Science
        • Human Rights
        • International Relations
        • Language and Linguistics
        • Law
        • Literature and Literary Criticism
        • Migration Studies
        • Policy Studies
        • Political Science
        • Public Administration
        • Sociology
        • Translation Studies
      • Indian Languages
        • Bangla
        • Gujarati
        • Hindi
        • Kannada
        • Marathi
        • Nepali
        • Odia
        • Tamil
      • People's Linguistic Survey of India (PLSI)
      • Science, Technology, Medicine and Management
        • Ayurveda
        • Biotechnology
        • Business and Management
        • Computer Science
        • Engineering & Technology
        • Environment and Biodiversity
        • Mathematics
        • Medical and Paramedical
        • Physics and Chemistry
        • Popular Science
    • General Books
      • Atlas
      • Children's Books
      • Cookery
      • General Interest
      • Life Writing
      • Literature in Translation
      • Media Studies
      • Reference
    • Professional Development
    • Download Catalogues
    • Recommendation Form
  • e-Books
  • Events
  • About Us
    • Our Company
    • Our Network
    • Associate Imprints
    • Social Responsibility
      • Act
      • Projects
    • Investors
      • Information for Shareholders
      • Annual return form MGT-7
    • Work with Us
    • Publish with Us
    • Contact Us
  • More
    • Open Access
    • Need Help ?
  • Login
  • My Account
    • Logout

cover

Introduction to Cybersecurity

Concepts, Principles, Technologies and Practices

Ajay Singh

₹ 695

View details

Imprint

Universities Press

Year of Publishing

2023

Number of pages

328

ISBN

9789393330314

Format

Paperback

Language

English

Dimensions

180 x 240 mm

View details

Imprint

Universities Press

Year of Publishing

2023

ISBN

9789393330451

Format

eBook

Language

English

Available on
  • the Book
  • the Author(s)
  • Table of Contents
  • In the Media
  • Awards

In today's digital world, cybersecurity is an essential and critical survival skill. This book aims to provide students with foundational knowledge across the broad range of topics that they need to navigate cybersecurity challenges at the individual and organizational level. It offers an in-depth examination of the various types of cybercrimes and cyberattacks and the management practices, strategies, tools and technologies that can be used to secure information. It also explores cyber laws and regulations and explains how the evolution of and advances in digital technologies have had a major influence on both cybercrime and cybersecurity.

Salient features

  • Clearly defined objectives at the beginning of every chapter
  • Nuggets of information, such as contextual case studies, important statistics, critical definitions and crucial processes, presented as info boxes
  • Chapter-end exercises comprise multiple choice questions with answers and subjective questions
  • Annexures on cybercrime and cyberattack reporting in India, the 50 most significant cyberattacks from 2011 to 2021, additional self-assessment questions and a list of abbreviations and acronyms used in the book for quick reference
  • Chapter-wise PowerPoint slides are available at www.universitiespress.com/IntroductionToCybersecurity
+ Read more

Ajay Singh is a Member of the Academic Advisory Board, Pace University – Seidenberg School of Computer Science and Information Systems, New York, USA. A certified Corporate Director and Fellow of the Institute of Directors, he has over 35 years' experience in the IT industry in different roles and has authored several books on cybersecurity and cyber risk management.

+ Read more

Preface
Acknowledgements
List of Tables
List of Info Boxes

Chapter 1: Security in an Interconnected World

Introduction to Information Systems | What is an Information System? | Evolution and Types of Information Systems | Evolution and Growth of the Internet | Information System Development and Maintenance | Cyberspace and Cybersecurity | What is Information Security? | Organization and Governance of the Internet and Cybersecurity | Information Security Models

Chapter 2: Cybercrime, Cyberattack Tools and Methods, Threat Sources and Cyber Offenders
Introduction | What is a Cybercrime? | Classification of Cybercrimes | Forms of Cybercrimes | Cyber Scams and Frauds | Sources of Threats: Threat Actors and their Motivations | Tools and Methods Used in Cyberattacks/Cybercrimes | What is a Cyberattack? | Responding to Cyberattacks and the Cyber Kill Chain | Cyberattacks: Organizational Implications | Cyberattacks Impacting Citizens and Communities | Prevention of Cybercrime | International Efforts to Deal with Cybercrime | National Cybersecurity Policy | Online Code of Conduct and Computer Ethics

Chapter 3: Cybersecurity Vulnerabilities
Introduction | Security Considerations and Challenges | Types of Vulnerabilities | Project OWASP | Vulnerabilities Assessment | Common Vulnerabilities and Exposures (CVE): Institutional Mechanisms

Chapter 4: Cybersecurity Management Practices
Overview of Cybersecurity Management | Information Classification Process | Security Policies | Security Procedures and Guidelines | Security Controls | Security Organization | Incident Response | Business Continuity and Disaster Recovery

Chapter 5: Developing Secure Information Systems
Introduction | Securing Information Assets | Data Security and Protection | Application Security | Security Architecture and Design | Security Issues in Hardware, Mobile Devices and Internet of Things | Network Security | Operating System Security | Database Security | User Management | Physical Security of IT Assets | Techniques/Methods for Data Security and Protection | Issues Related to Digital File Sharing

Chapter 6: Cybersecurity Strategies and Approaches
Introduction | Information Security Governance and Risk Management | Cyber Risk Management | Cybersecurity Frameworks | Cyber Resilience | Industry-specific Cybersecurity Frameworks | The Human Factor in Cybersecurity | Algorithms and Techniques for Cybersecurity

Chapter 7: Cybersecurity Technologies
Introduction | Securing Networks, Web Applications, Services and Servers | Email Security | Antivirus Technologies and Solutions | Identity and Access Management | Authentication | Cryptography | How Do Digital Money, Cryptocurrency and NFTs Work? | Digital Signatures | Advanced Technologies and Approaches in Cybersecurity | Internet Protocols and Ports

Chapter 8: Cyber Laws and Forensics
Need for Cyber Laws and Regulations | Role of International Law and Governments | Challenges for Law-makers and Law Enforcement Agencies | Cybersecurity Regulations | Cyber Forensics | Cybercrime Techniques | Prevention of Cybercrime and Protection | Cybercrime Investigation | Evidence Collection and Analysis | Intellectual Property Issues in Cyberspace

Chapter 9: Personal Cybersecurity, Privacy and Data Protection
Introduction | What is Personal Cybersecurity? | Common Causes of Personal Security Breaches | Personal Cybersecurity Best Practices | Privacy Regulations and Cybersecurity | The Role of Ethics in Cybersecurity

Chapter 10: Cybersecurity in Evolving Technology and Practice
Introduction | Future Challenges in Cybersecurity | Web 3.0 | Harnessing Artificial Intelligence for Cybersecurity | Blockchain for Cybersecurity | Quantum Computing and Cybersecurity | Combating Advanced Persistent Threats | Digital Trust and Identity Management | 5G Networks and Cybersecurity | Adopting a ‘Secure-by-Design’ Approach | Supply Chain Cybersecurity | Other Evolving Aspects of Cybersecurity

Chapter 11: Cybersecurity in E-commerce and Digital Payments
Introduction | What is E-commerce? | Elements of E-commerce Security | E-commerce Security Best Practices | Digital Payments | RBI Guidelines on Digital Payments and Customer Protection | Laws on Privacy and Data Protection for E-commerce Companies

Chapter 12: Overview of Social Media and Security
Introduction to Social Networks | Types of Social Media and Popular Platforms | Social Media Marketing | Social Media Monitoring | Social Media Privacy | Social Media Privacy Laws and Personal Data Protection | Flagging and Reporting of Inappropriate Content | Laws Regarding Posting of Inappropriate Content | Data Harvesting and Personal Data Protection | Best Practices for the Use of Social Media

Annexure A: Cybercrime and Cyberattack Reporting in India

Annexure B: 50 Significant Cyberattacks/Data Breaches: 2011–2021
Annexure C: Self-Assessment Questions
Annexure D: List of Abbreviations and Acronyms
Index

+ Read more
An extract | Published by Force News Magazine.
Introduction to Cybersecurity: Concepts, Principles, Technologies and Practices has won the Golden Book Award 2024.
  • the Book
  • the Author(s)
  • Table of Contents

In today's digital world, cybersecurity is an essential and critical survival skill. This book aims to provide students with foundational knowledge across the broad range of topics that they need to navigate cybersecurity challenges at the individual and organizational level. It offers an in-depth examination of the various types of cybercrimes and cyberattacks and the management practices, strategies, tools and technologies that can be used to secure information. It also explores cyber laws and regulations and explains how the evolution of and advances in digital technologies have had a major influence on both cybercrime and cybersecurity.

Salient features

  • Clearly defined objectives at the beginning of every chapter
  • Nuggets of information, such as contextual case studies, important statistics, critical definitions and crucial processes, presented as info boxes
  • Chapter-end exercises comprise multiple choice questions with answers and subjective questions
  • Annexures on cybercrime and cyberattack reporting in India, the 50 most significant cyberattacks from 2011 to 2021, additional self-assessment questions and a list of abbreviations and acronyms used in the book for quick reference
  • Chapter-wise PowerPoint slides are available at www.universitiespress.com/IntroductionToCybersecurity
+ Read more

Ajay Singh is a Member of the Academic Advisory Board, Pace University – Seidenberg School of Computer Science and Information Systems, New York, USA. A certified Corporate Director and Fellow of the Institute of Directors, he has over 35 years' experience in the IT industry in different roles and has authored several books on cybersecurity and cyber risk management.

+ Read more

Preface
Acknowledgements
List of Tables
List of Info Boxes

Chapter 1: Security in an Interconnected World

Introduction to Information Systems | What is an Information System? | Evolution and Types of Information Systems | Evolution and Growth of the Internet | Information System Development and Maintenance | Cyberspace and Cybersecurity | What is Information Security? | Organization and Governance of the Internet and Cybersecurity | Information Security Models

Chapter 2: Cybercrime, Cyberattack Tools and Methods, Threat Sources and Cyber Offenders
Introduction | What is a Cybercrime? | Classification of Cybercrimes | Forms of Cybercrimes | Cyber Scams and Frauds | Sources of Threats: Threat Actors and their Motivations | Tools and Methods Used in Cyberattacks/Cybercrimes | What is a Cyberattack? | Responding to Cyberattacks and the Cyber Kill Chain | Cyberattacks: Organizational Implications | Cyberattacks Impacting Citizens and Communities | Prevention of Cybercrime | International Efforts to Deal with Cybercrime | National Cybersecurity Policy | Online Code of Conduct and Computer Ethics

Chapter 3: Cybersecurity Vulnerabilities
Introduction | Security Considerations and Challenges | Types of Vulnerabilities | Project OWASP | Vulnerabilities Assessment | Common Vulnerabilities and Exposures (CVE): Institutional Mechanisms

Chapter 4: Cybersecurity Management Practices
Overview of Cybersecurity Management | Information Classification Process | Security Policies | Security Procedures and Guidelines | Security Controls | Security Organization | Incident Response | Business Continuity and Disaster Recovery

Chapter 5: Developing Secure Information Systems
Introduction | Securing Information Assets | Data Security and Protection | Application Security | Security Architecture and Design | Security Issues in Hardware, Mobile Devices and Internet of Things | Network Security | Operating System Security | Database Security | User Management | Physical Security of IT Assets | Techniques/Methods for Data Security and Protection | Issues Related to Digital File Sharing

Chapter 6: Cybersecurity Strategies and Approaches
Introduction | Information Security Governance and Risk Management | Cyber Risk Management | Cybersecurity Frameworks | Cyber Resilience | Industry-specific Cybersecurity Frameworks | The Human Factor in Cybersecurity | Algorithms and Techniques for Cybersecurity

Chapter 7: Cybersecurity Technologies
Introduction | Securing Networks, Web Applications, Services and Servers | Email Security | Antivirus Technologies and Solutions | Identity and Access Management | Authentication | Cryptography | How Do Digital Money, Cryptocurrency and NFTs Work? | Digital Signatures | Advanced Technologies and Approaches in Cybersecurity | Internet Protocols and Ports

Chapter 8: Cyber Laws and Forensics
Need for Cyber Laws and Regulations | Role of International Law and Governments | Challenges for Law-makers and Law Enforcement Agencies | Cybersecurity Regulations | Cyber Forensics | Cybercrime Techniques | Prevention of Cybercrime and Protection | Cybercrime Investigation | Evidence Collection and Analysis | Intellectual Property Issues in Cyberspace

Chapter 9: Personal Cybersecurity, Privacy and Data Protection
Introduction | What is Personal Cybersecurity? | Common Causes of Personal Security Breaches | Personal Cybersecurity Best Practices | Privacy Regulations and Cybersecurity | The Role of Ethics in Cybersecurity

Chapter 10: Cybersecurity in Evolving Technology and Practice
Introduction | Future Challenges in Cybersecurity | Web 3.0 | Harnessing Artificial Intelligence for Cybersecurity | Blockchain for Cybersecurity | Quantum Computing and Cybersecurity | Combating Advanced Persistent Threats | Digital Trust and Identity Management | 5G Networks and Cybersecurity | Adopting a ‘Secure-by-Design’ Approach | Supply Chain Cybersecurity | Other Evolving Aspects of Cybersecurity

Chapter 11: Cybersecurity in E-commerce and Digital Payments
Introduction | What is E-commerce? | Elements of E-commerce Security | E-commerce Security Best Practices | Digital Payments | RBI Guidelines on Digital Payments and Customer Protection | Laws on Privacy and Data Protection for E-commerce Companies

Chapter 12: Overview of Social Media and Security
Introduction to Social Networks | Types of Social Media and Popular Platforms | Social Media Marketing | Social Media Monitoring | Social Media Privacy | Social Media Privacy Laws and Personal Data Protection | Flagging and Reporting of Inappropriate Content | Laws Regarding Posting of Inappropriate Content | Data Harvesting and Personal Data Protection | Best Practices for the Use of Social Media

Annexure A: Cybercrime and Cyberattack Reporting in India

Annexure B: 50 Significant Cyberattacks/Data Breaches: 2011–2021
Annexure C: Self-Assessment Questions
Annexure D: List of Abbreviations and Acronyms
Index

+ Read more

We use cookies to improve your experience. More information can be found in our Cookie Policy.

Links

  • Events
  • Publish with Us
  • Work with Us
  • Contact Us

Orient Blackswan Private Limited

  • 3-6-752 Himayatnagar, Hyderabad
  • Telangana 500 029, India
  • info@orientblackswan.com
Disclaimer and Privacy Policy | Terms and Conditions Copyright © Orient Blackswan Private Limited. All rights reserved.