Preface
Acknowledgements
List of Tables
List of Info Boxes
Chapter 1: Security in an Interconnected World
Introduction to Information Systems | What is an Information System? | Evolution and Types of
Information Systems | Evolution and Growth of the Internet | Information System Development and
Maintenance | Cyberspace and Cybersecurity | What is Information Security? | Organization and
Governance of the Internet and Cybersecurity | Information Security Models
Chapter 2: Cybercrime, Cyberattack Tools and Methods, Threat Sources and Cyber Offenders
Introduction | What is a Cybercrime? | Classification of Cybercrimes | Forms of Cybercrimes | Cyber
Scams and Frauds | Sources of Threats: Threat Actors and their Motivations | Tools and Methods
Used in Cyberattacks/Cybercrimes | What is a Cyberattack? | Responding to Cyberattacks and the
Cyber Kill Chain | Cyberattacks: Organizational Implications | Cyberattacks Impacting Citizens and
Communities | Prevention of Cybercrime | International Efforts to Deal with Cybercrime | National
Cybersecurity Policy | Online Code of Conduct and Computer Ethics
Chapter 3: Cybersecurity Vulnerabilities
Introduction | Security Considerations and Challenges | Types of Vulnerabilities | Project OWASP |
Vulnerabilities Assessment | Common Vulnerabilities and Exposures (CVE): Institutional Mechanisms
Chapter 4: Cybersecurity Management Practices
Overview of Cybersecurity Management | Information Classification Process | Security Policies |
Security Procedures and Guidelines | Security Controls | Security Organization | Incident Response |
Business Continuity and Disaster Recovery
Chapter 5: Developing Secure Information Systems
Introduction | Securing Information Assets | Data Security and Protection | Application Security |
Security Architecture and Design | Security Issues in Hardware, Mobile Devices and Internet of
Things | Network Security | Operating System Security | Database Security | User Management |
Physical Security of IT Assets | Techniques/Methods for Data Security and Protection | Issues Related
to Digital File Sharing
Chapter 6: Cybersecurity Strategies and Approaches
Introduction | Information Security Governance and Risk Management | Cyber Risk Management |
Cybersecurity Frameworks | Cyber Resilience | Industry-specific Cybersecurity Frameworks |
The Human Factor in Cybersecurity | Algorithms and Techniques for Cybersecurity
Chapter 7: Cybersecurity Technologies
Introduction | Securing Networks, Web Applications, Services and Servers | Email Security | Antivirus
Technologies and Solutions | Identity and Access Management | Authentication | Cryptography |
How Do Digital Money, Cryptocurrency and NFTs Work? | Digital Signatures | Advanced
Technologies and Approaches in Cybersecurity | Internet Protocols and Ports
Chapter 8: Cyber Laws and Forensics
Need for Cyber Laws and Regulations | Role of International Law and Governments | Challenges
for Law-makers and Law Enforcement Agencies | Cybersecurity Regulations | Cyber Forensics |
Cybercrime Techniques | Prevention of Cybercrime and Protection | Cybercrime Investigation |
Evidence Collection and Analysis | Intellectual Property Issues in Cyberspace
Chapter 9: Personal Cybersecurity, Privacy and Data Protection
Introduction | What is Personal Cybersecurity? | Common Causes of Personal Security Breaches |
Personal Cybersecurity Best Practices | Privacy Regulations and Cybersecurity | The Role of Ethics in
Cybersecurity
Chapter 10: Cybersecurity in Evolving Technology and Practice
Introduction | Future Challenges in Cybersecurity | Web 3.0 | Harnessing Artificial Intelligence
for Cybersecurity | Blockchain for Cybersecurity | Quantum Computing and Cybersecurity |
Combating Advanced Persistent Threats | Digital Trust and Identity Management | 5G Networks
and Cybersecurity | Adopting a ‘Secure-by-Design’ Approach | Supply Chain Cybersecurity | Other
Evolving Aspects of Cybersecurity
Chapter 11: Cybersecurity in E-commerce and Digital Payments
Introduction | What is E-commerce? | Elements of E-commerce Security | E-commerce Security Best
Practices | Digital Payments | RBI Guidelines on Digital Payments and Customer Protection | Laws on
Privacy and Data Protection for E-commerce Companies
Chapter 12: Overview of Social Media and Security
Introduction to Social Networks | Types of Social Media and Popular Platforms | Social Media Marketing
| Social Media Monitoring | Social Media Privacy | Social Media Privacy Laws and Personal Data
Protection | Flagging and Reporting of Inappropriate Content | Laws Regarding Posting of Inappropriate
Content | Data Harvesting and Personal Data Protection | Best Practices for the Use of Social Media
Annexure A: Cybercrime and Cyberattack Reporting in India
Annexure B: 50 Significant Cyberattacks/Data Breaches: 2011–2021
Annexure C: Self-Assessment Questions
Annexure D: List of Abbreviations and Acronyms
Index