Preface  
    Acknowledgements 
    List of  Tables
    List of  Info Boxes
    
  Chapter 1: Security in an Interconnected  World
  Introduction to Information Systems | What is an  Information System? | Evolution and Types of 
  Information Systems | Evolution and Growth of the  Internet | Information System Development and 
  Maintenance | Cyberspace and Cybersecurity | What is  Information Security? | Organization and 
  Governance of the Internet and Cybersecurity |  Information Security Models
  Chapter 2: Cybercrime, Cyberattack Tools  and Methods, Threat Sources and Cyber Offenders
  Introduction | What is a Cybercrime? | Classification  of Cybercrimes | Forms of Cybercrimes | Cyber 
  Scams and Frauds | Sources of Threats: Threat Actors  and their Motivations | Tools and Methods 
  Used in Cyberattacks/Cybercrimes | What is a  Cyberattack? | Responding to Cyberattacks and the 
  Cyber Kill Chain | Cyberattacks: Organizational  Implications | Cyberattacks Impacting Citizens and 
  Communities | Prevention of Cybercrime | International  Efforts to Deal with Cybercrime | National 
  Cybersecurity Policy | Online Code of Conduct and  Computer Ethics
    Chapter 3: Cybersecurity Vulnerabilities
  Introduction | Security Considerations and Challenges  | Types of Vulnerabilities | Project OWASP |
  Vulnerabilities Assessment | Common Vulnerabilities  and Exposures (CVE): Institutional Mechanisms
    Chapter 4: Cybersecurity Management  Practices
  Overview of Cybersecurity Management | Information  Classification Process | Security Policies | 
  Security Procedures and Guidelines | Security Controls  | Security Organization | Incident Response |
  Business Continuity and Disaster Recovery
    Chapter 5: Developing Secure Information  Systems
  Introduction | Securing Information Assets | Data  Security and Protection | Application Security | 
  Security Architecture and Design | Security Issues in  Hardware, Mobile Devices and Internet of 
  Things | Network Security | Operating System Security  | Database Security | User Management | 
  Physical Security of IT Assets | Techniques/Methods  for Data Security and Protection | Issues Related 
  to Digital File Sharing
    Chapter 6: Cybersecurity Strategies and  Approaches
  Introduction | Information Security Governance and  Risk Management | Cyber Risk Management |
  Cybersecurity Frameworks | Cyber Resilience |  Industry-specific Cybersecurity Frameworks |
  The Human Factor in Cybersecurity | Algorithms and  Techniques for Cybersecurity
    Chapter 7: Cybersecurity Technologies
  Introduction | Securing Networks, Web Applications,  Services and Servers | Email Security | Antivirus 
  Technologies and Solutions | Identity and Access  Management | Authentication | Cryptography |
  How Do Digital Money, Cryptocurrency and NFTs Work? |  Digital Signatures | Advanced 
  Technologies and Approaches in Cybersecurity |  Internet Protocols and Ports
    Chapter 8: Cyber Laws and Forensics
  Need for Cyber Laws and Regulations | Role of  International Law and Governments | Challenges 
  for Law-makers and Law Enforcement Agencies | Cybersecurity  Regulations | Cyber Forensics |
  Cybercrime Techniques | Prevention of Cybercrime and  Protection | Cybercrime Investigation |
  Evidence Collection and Analysis | Intellectual  Property Issues in Cyberspace
    Chapter 9: Personal Cybersecurity, Privacy  and Data Protection
  Introduction | What is Personal Cybersecurity? |  Common Causes of Personal Security Breaches |
  Personal Cybersecurity Best Practices | Privacy  Regulations and Cybersecurity | The Role of Ethics in 
  Cybersecurity
    Chapter 10: Cybersecurity in Evolving  Technology and Practice
  Introduction | Future Challenges in Cybersecurity |  Web 3.0 | Harnessing Artificial Intelligence
  for Cybersecurity | Blockchain for Cybersecurity |  Quantum Computing and Cybersecurity |
  Combating Advanced Persistent Threats | Digital Trust  and Identity Management | 5G Networks 
  and Cybersecurity | Adopting a ‘Secure-by-Design’  Approach | Supply Chain Cybersecurity | Other
  Evolving Aspects of Cybersecurity
    Chapter 11: Cybersecurity in E-commerce and  Digital Payments
  Introduction | What is E-commerce? | Elements of  E-commerce Security | E-commerce Security Best 
  Practices | Digital Payments | RBI Guidelines on  Digital Payments and Customer Protection | Laws on
  Privacy and Data Protection for E-commerce Companies
    Chapter 12: Overview of Social Media and  Security
  Introduction to Social Networks | Types of Social  Media and Popular Platforms | Social Media Marketing
  | Social Media Monitoring | Social Media Privacy |  Social Media Privacy Laws and Personal Data 
  Protection | Flagging and Reporting of Inappropriate  Content | Laws Regarding Posting of Inappropriate 
  Content | Data Harvesting and Personal Data Protection  | Best Practices for the Use of Social Media
  
  Annexure A:  Cybercrime and Cyberattack Reporting in India 
  Annexure B:  50 Significant Cyberattacks/Data Breaches: 2011–2021
  Annexure C:  Self-Assessment Questions 
  Annexure D:  List of Abbreviations and Acronyms 
  Index