Swipe to navigate through the chapters of this book
Cyberspace has become a dangerous place. Cybercrime danger has grown during the last two decades. Computers used to be the domain of scientists and engineers with pocket protectors and too many ballpoint pens, not sophisticated criminals and menacing bullies. Almost every computer is connected to every other computer in the world via the Internet, offering unprecedented opportunities for communications and simultaneous opportunities for remote exploitation. This chapter summarizes the cybercrime problem, which ranges from annoying social media trolls to well-planned corporate attacks that strike tens of millions of victims.
Please log in to get access to this content
To get access to this content you need the following product:
CBS. “ These Cybercrime Statistics Will Make You Think Twice About Your Password: Where’s the CSI Cyber team when you need them?” March 3, 2015.
See Taylor Armerding, CIO, February 16, 2012. www.cio.com/article/2399262/data-breach/the-15-worst-data-security-breaches-of-the-21st-century.html . Accessed December 2015.
Phil Ducklin. “Internet of Things- do you really need a kettle that can boil your security dry?” Naked Security. October 10, 2015. https://nakedsecurity.sophos.com/2015/10/20/internet-of-things-do-you-really-need-a-kettle-that-can-boil-your-security-dry/ . Accessed December 2015.
Alexandra Burlacu. “Experts Warn It Just Takes 10 Seconds To Hack Fitbit Fitness Trackers: Here’s Fitbit’s Response.” Tech Times. October 24, 2015. www.techtimes.com/articles/98427/20151024/experts-warn-it-just-takes-10-seconds-to-hack-fitbit-fitness-trackers-heres-fitbits-response.htm . Accessed December 2015. Fitbit denied that the hack can do damage. Let’s hope that they are working on a fix. They would not be the first to stick their head in the sand and hope the problem goes away.
See Arbor Networks. “Arbor Networks 10th Annual Worldwide Infrastructure Security Report Finds 50X Increase in DDoS Attack Size in Past Decade.” www.arbornetworks.com/news-and-events/press-releases/recent-press-releases/5351-arbor-networks-10th-annual-worldwide-infrastructure-security-report-finds-50x-increase-in-ddos-attack-size-in-past-decade . Accessed December 2015.
See Akamai Technologies, Inc. “State of the Internet Security Report Q3 2015.”
www.stateoftheinternet.com/downloads/pdfs/2015-cloud-security-report-q3.pdf . Accessed December 2015.
For an overview of the size and resilience of botnets, see Karl Thomas, “Nine Bad Botnets and The Damage They Did,” February 25, 2015. www.welivesecurity.com/2015/02/25/nine-bad-botnets-damage/ . Accessed December 2015.
Countries that are able to shut off the outside world have their own vulnerabilities. They may be isolated against their will by a hostile attack on their gateways. A country, active in international business, such as China, shut off from online business contact with their international partners by a hostile cyberforce could be economically devastated.
See Federal Bureau of Investigation, Internet Crime Complaint Center, 2014 Internet Crime Report. www.ic3.gov/media/annualreport/2014_IC3Report.pdf . Accessed December 2015. p. 47.
Center for Disease Control. Bullying Fact Sheet. www.cdc.gov/violenceprevention/pdf/bullying_factsheet.pdf . Accessed December 2015.
See http://newsroom.fb.com/company-info/ . Accessed December 2015.
See https://about.twitter.com/company . Accessed December 2015.
See Federal Bureau of Investigation, Internet Crime Complaint Center, 2014 Internet Crime Report. www.ic3.gov/media/annualreport/2014_IC3Report.pdf . Accessed December 2015. p. 41.
- What’s Biting Us
- Sequence number
- Chapter number
- Chapter 1