1Chapter 1. Computer Crimes
496.9 Exercise
21.1 Computer Crime
50Chapter 7. Cybersecurity Attacks
31.2 Cybercrime
517.1 Malware
41.3 Computer crime and cybercrime
527.2 SQL Injection
51.4 Distinction between Cyber Crime and
537.3 Denial-of-service
6Conventional Crimes
547.4 Man in the Middle Attacks
71.5 Cyber Forensics
557.5 Credential Reuse
81.6 Summary
567.6 Phishing
91.7 Exercise
577.7 Session Hijacking
10Chapter 2. Types of Cyber Crimes
587.8 Summary
112.1 Cyber TresPass
59Chapter 8. Copywriting Protection in Cyber World
122.2 Cyber Deceptions and Thefts
608.1 Components of cybersquatting definition
132.3 Cyber Pornography
618.2 Types of Cybersquatting
142.4 Cyber Violence
628.3 Prevention of Cybersquatting of
152.5 Classification of cyber crimes
63Your Domain
162.6 Summary
648.4 Copywriting Ownership and Assignment
172.7 Exercise
65the Internet
18Chapter 3. Cyber Criminals
668.8 Computer Software Piracy
193.1. Hackers
678.9 Summary
203.2 Organized Hackers
688.10 Exercise
213.3 Internet stalkers
69Chapter 9. Regulatory Framework
223.4 Disgruntled Employees
709.1 Introduction
233.5 Summary
719.2 Types of Cybersecurity Frameworks
243.6 Exercise
729.3 NIST Cybersecurity Framework
25Chapter 4. Identity Thefts
739.4 CIS Framework
264.1 Identity Thefts
749.5 The International Standards Organization
274.2 Types of Identity Theft
75(ISO) frameworks ISO/IEC 27001 and 27002
284.3 Techniques of Identity thefts
769.6 Summary
294.4 Steps of Prevention
779.7 Exercise
304.5 Summary
78Chapter 10. Cyber Protection Laws Worldwide
314.6 Exercise
7910.1 Data protection privacy laws
32Chapter 5. Cloud Computing
8010.2 Cybercrime laws
33 5.1 Introduction to cloud
8110.3 Consumer Protection Laws
345.2 Cloud Deployment Models
8210.4 Summary
355.3 Cloud Computing threats
8310.5 Exercise
365.4 Cloud Computing attacks
84Chapter 11. Case Studies
375.5 Cloud security control layers
8511.1 Case Study 1: Ransomware group LockBit
385.6 Penetration Testing
86attacks Bangkok Airways and releases
395.7 Summary
87passenger data, including passport and
405.8 Exercise
88credit card information
41Chapter 6. Cryptography
8911.2 Case Study 2: Defending The DA’s Office
426.1 Features of Cryptography
90Network Security Saves San Francisco Millions
436.3 Encryption Algorithms
9111.3 Case Study 3: Uber Data Breach – 57
446.4 Public Key Infrastructure
92Million Records
456.5 Email Encryption
9311.4 Case Study 4: Colonial Pipeline
466.6 Disk Encryption
9411.5 Summary
476.7 Cryptography Attacks
9511.6 Exercise
486.8 Summary
96Glossary