Page 17 - My FlipBook
P. 17

INDEX


              Adobe, 27            cybersecurity, 12, 28, 32,   encryption, 59–60, 66, 73,
              Airbus Hacks, 30         68, 88, 91, 94–95,   94, 96, 102
              al-Qaeda. See Qaeda, al-  98–100, 104, 106  ethical hacking, 102–104
              Apple, 30              consultants, 35, 77, 101,
                                       105               fake news, 40, 47, 49–50,
              Baltimore hack, 61     Emsisoft, 62           52, 54–55
              black hat hackers, 104  experts, 25–26, 33, 38,   firewalls, 88, 94, 96–97
              Butterfly, 30            62, 69, 81, 98–99,
                                       101–102           genealogy, 14–15
              certifications, 102    FireEye Threat      Google, 16–17, 20, 22,
              China, 25, 29, 31, 33, 37,   Intelligence, 50  27, 73
                  50, 74, 77, 89     Horne Cyber, 64     Google AdSense, 49
              Clarke, Richard, 76    incident response plans,   government agencies,
              Clinton, Hillary, 38, 40,   95                27, 31, 62–63, 86,
                  45–47, 50          incident responses, 94  95, 98, 100, 102,
              Cobalt Dickens hack, 25–26  Recorded Future, 61  104–105
              computer science, 42, 72,   risk assessments, 95, 101  Central Intelligence
                  82, 101            Symantec, 52, 58       Agency (CIA), 10,
              confirmation bias, 54  cybersleuthing, 16–18, 22,   45
              conspiracy theories, 48  26, 35             Department of Defense
                Seth Rich conspiracy   corporate cybersleuthing,   (DOD), 5, 10, 27
                  theory, 44–47, 52    20                 Department of Justice
              Consumer Electronics Show,   dating, 16, 22–23  (DOJ), 19, 25, 65, 72
                  90–91              Matthews, Todd, 18–19  Federal Bureau of
              cryptocurrencies, 59   websleuthing, 18–19    Investigation (FBI), 10,
                Bitcoin, 58–61     cyberspies, 9–13, 16,    31, 46, 58, 62, 72
              cryptography, 5, 101–102  24–26, 28–30, 32,   National Aeronautics and
              cyberbullying, 20–21     36, 38, 42, 51, 80,   Space Administration
                doxing, 20–21, 37      83, 106              (NASA), 27, 31, 48
              cybercriminals, 26, 29, 61,   Loren Sands-Ramshaw   National Security Agency
                  62, 98, 104          4–8                  (NSA), 5–10, 32, 83,
              cyberdefense, 94–95  cyberstalking, 20–21     88
              cyberespionage, 24–27,   cyberterrorism, 5, 10–11,
                  30–31, 33, 36, 38,   71–75, 77, 98, 104  hacktivism, 37–38, 74
                  41–42, 99        cyberthreats, 32, 97, 100,   Anonymous, 37
              cyberextortion, 58–62, 64,   102–103, 105–106  Hess, Markus, 26–27
                  73, 98           cyberwarfare, 32–33,    Hollywood Presbyterian
              cyberintelligence, 8–10, 45,   76–77, 81–89,   Medical Center, 56–58
                  83, 89, 101–103      100–101, 105–106  honeypots, 26
              cyberjobs, 101–105
              cyberpolitics disinformation   Democratic National   information technology (IT),
                  campaigns, 38–39, 52,   Committee (DNC),   8, 12, 29, 32, 58, 76,
                  55, 65               44–46                91, 94–95, 100–101,
                voting hacks, 41–42 See   DNC hack, 38, 47  104
                  also fake news   disinformation, 47    Interview, The, 27–28
              cyberpropoganda, 40,   distributed denial-of-service   Iran, 25, 51–52, 64–65, 74,
                  45–46, 50–52, 55, 73  (DDoS) attack, 66,   83–84, 89
              cyberscams, 11, 29, 33,   68–69, 81, 84, 94  ISIS, 10–12, 73–75
                  92–93            Doe Network, 19        Cyber Caliphate Army
                                                            (CCA), 11, 76–77



                                                                              117
   12   13   14   15   16   17   18   19   20