Cybercrime and Cybersecurity

This course includes
Lessons
TestPrep
Lab
AI Tutor (Add-on)
Get A Free Trial

Get the support you need. Enroll in our Instructor-Led Course.

Lessons

13+ Lessons |

TestPrep

1

Preface

2

Introduction

  • Confidentiality
  • Integrity
  • Availability
  • Conclusion
3

Risk Management

  • Risk Assessment Scope
  • Analysing Data
  • Risk Mitigation or Acceptance?
  • Case Study: Which Country Is Most Likely to Attack?
  • Conclusion
4

Threats

  • Mistakes
  • Stealing and Fraud
  • Employee Sabotage
  • Supporting Infrastructure Loss
  • Hacking
  • Espionage (Commercial and Government)
  • Malicious Code (Malware)
  • Scams
  • Case Study: Data Loss in the British Government
  • Conclusion
5

Organisational Responses

  • The Cybersecurity Strategy
  • Case Study: Monitoring the Underground Economy
  • Conclusion
6

Operational Security: Users

  • Staffing
  • Managing Users
  • Psychological Factors
  • Modifying User Behaviour
  • Case Study: A Non-Associative Model of Phishing
  • Conclusion
7

Operational Security: Systems

  • Physical Security
  • Conclusion
8

Operational Security: Threat Response

  • Situational Crime Prevention
  • Incident Response
  • Disaster Response
  • Conclusion
9

Technical Responses: Securing Systems

  • Identification and Authentication
  • Authorisation and Access Control
  • Cryptography
  • Steganography
  • Antivirus
  • Conclusion
10

Technical Responses: Forensics

  • Conclusion
11

Technical Responses: Penetration Testing

  • Breaking into Your Own Network
  • Breaking Your Own Applications
  • Conclusion
12

Regulatory and Legal Responses

  • Expert Juries
  • Conclusion
13

Honeypots and Deception

  • Child Exploitation as a Cybercrime
  • Technical Mechanisms for Warning Message Delivery
  • The Classic Case
  • The Broader Case
  • Legal Issues
  • Conclusion

Related Courses

All Course
scroll to top