Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning
Written by Richard Bingley
Narrated by Daniel Crispin
()
About this audiobook
This book discusses:
- Definitions of cyber terrorism;
- Ideologies and idealisations that can lead to cyber terrorism;
- How threat actors use computer systems to diversify, complicate and increase terrorist attack impacts;
- The role of Big Tech and social media organisations such as X (formerly Twitter) and Instagram within the cyber threat landscape; and
- How organisations can prepare for acts of cyber terrorism via security planning and incident response strategies such as ISO 31000, ISO 27001 and the NIST Cybersecurity Framework.
Increasingly, cyber security practitioners are confronted with a stark phrase: cyber terrorism. For many, it conveys fear and hopelessness. What is this thing called 'cyber terrorism' and what can we begin to do about it?
Malicious-minded ICT users, programmers and even programs (including much AI-powered software) have all been instrumental in recruiting, inspiring, training, executing and amplifying acts of terrorism. This has resulted in the loss of life and/or life-changing physical injuries that could never have occurred without support and facilitation from the cyber sphere. These types of attacks can be encapsulated by the phrase 'cyber terrorism'.
This book recounts case studies to show the types of threats we face and provides a comprehensive coverage of risk management tactics and strategies to protect yourself against such nefarious threat actors. These include key mitigation and controls for information security or security and HR-related professionals.
Richard Bingley
Richard Bingley is a senior lecturer in security and organisational resilience at Buckinghamshire New University, and co-founder of CSARN, the popular business security advisory network. He has more than fifteen years’ experience in a range of high-profile security and communications roles, including as a close protection operative at London’s 2012 Olympics and in Russia for the 2014 Winter Olympic Games. He is a licensed close protection operative in the UK, and holds a postgraduate certificate in teaching and learning in higher education. Richard is the author of two previous books: Arms Trade: Just the Facts(2003) and Terrorism: Just the Facts (2004).
Related to Combatting Cyber Terrorism
Related audiobooks
Cyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsThe Art of Cyber Security: A practical guide to winning the war on cyber crime Rating: 0 out of 5 stars0 ratingsThe Promise of Cybersecurity: From Prevention to Response: Building a Fortified Cyber Environment Rating: 0 out of 5 stars0 ratingsSee Yourself in Cyber: Security Careers Beyond Hacking Rating: 0 out of 5 stars0 ratingsComputer Skills: Understanding Computer Science and Cyber Security (2 in 1) Rating: 0 out of 5 stars0 ratingsThe Doctor's In: Treating America's Greatest Cyber Security Threat Rating: 0 out of 5 stars0 ratingsDefense In Depth: Network Security And Cyber Resilience Rating: 0 out of 5 stars0 ratingsCybersecurity's Next Frontier: Navigating the Cyber Threat Landscape: A Comprehensive Guide Rating: 0 out of 5 stars0 ratingsCybersecurity Leadership: Powering the Modern Organization Rating: 0 out of 5 stars0 ratingsNavigating Cybersecurity: Defending Against Cyber Threats: Strategies for a Secure Online Environment Rating: 0 out of 5 stars0 ratingsFuture Horizons in Cybersecurity: Defensive Fortitude: A Comprehensive Guide to Safeguarding Digital Assets Rating: 0 out of 5 stars0 ratingsA Journey into Cybersecurity: Mastering Cybersecurity: Expert Insights and Best Practices Rating: 0 out of 5 stars0 ratingsChina and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain Rating: 0 out of 5 stars0 ratingsCybersecurity in Healthcare: A National Study of HIPAA Implementation Rating: 0 out of 5 stars0 ratingsCyber Warfare in 2022+: Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates Rating: 0 out of 5 stars0 ratingsCybersecurity Essentials: Protecting Your Digital World Rating: 0 out of 5 stars0 ratingsCybersecurity Unveiled: Protecting Your Digital World in the Age of Information Rating: 0 out of 5 stars0 ratingsCyberwatch 101: The Art Of Cyber Defense And Infrastructure Security Rating: 0 out of 5 stars0 ratingsNavigating Cybersecurity and Ethical Hacking: The Art of Ethical Hacking: Exploring Cybersecurity from Within Rating: 0 out of 5 stars0 ratingsThe Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices Rating: 0 out of 5 stars0 ratingsIntelligent Safety: How to Protect Your Connected Family from Big Cybercrime Rating: 0 out of 5 stars0 ratingsGuardians of the Virtual Realm: From Protection to Penetration: Navigating Cybersecurity and Ethical Hacking Techniques Rating: 0 out of 5 stars0 ratingsCYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsCybersecurity and Ethical Hacking: Safeguarding Systems and Expanding Boundaries Rating: 0 out of 5 stars0 ratingsCybersecurity: Cybersecurity Essentials: Safeguarding Your Digital World Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners: Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals Explained Rating: 5 out of 5 stars5/5The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5
Security For You
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 4 out of 5 stars4/5(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5The Bitcoin Standard: The Decentralized Alternative to Central Banking Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 4 out of 5 stars4/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 4 out of 5 stars4/5Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Rating: 4 out of 5 stars4/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsFAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions Rating: 5 out of 5 stars5/5Blockchain For Dummies Rating: 4 out of 5 stars4/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Red Team Operations: Attack: Black Box Hacking, Social Engineering & Web App Scanning Rating: 5 out of 5 stars5/5CISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5Certified Information Security Manager CISM Study Guide Rating: 5 out of 5 stars5/5COMPTIA NETWORK+: Tips and Tricks to Learn and Study about The CompTIA Network+ Certification from A-Z Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 4 out of 5 stars4/5Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Rating: 4 out of 5 stars4/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5
Reviews for Combatting Cyber Terrorism
0 ratings0 reviews
