CyberSecurity Publications

CyberSecurity Publications

Mastering Cybersecurity GRC:  Empowering Boards and Executives for Excellence

Mastering Cybersecurity GRC: Empowering Boards and Executives for Excellence


Author: Dr Zoran Mitrovic

Description: Elevate your organisation's

governance, risk management, and compliance

(GRC) practices with this insightful guide. Empower

boards and executives to drive cybersecurity

excellence and strategic decision-making.

Intended readership: Board members, executives,

senior management personnel, governance

professionals, risk managers, compliance officers,

and anyone involved in overseeing or

implementing governance, risk management, and

compliance practices within organisations,

particularly in the context of cybersecurity.

Pages: 127

 

THE INTERPLAY BETWEEN COMPLIANCE, LEGAL REQUIREMENTS, AND CYBERSECURITY PRACTICES AND THE IMPORTANCE OF PROACTIVE COMPLIANCE

The intricate relationship between compliance, legal requirements, and cybersecurity practices underscores their symbiotic nature. Compliance with laws and regulations mandates the adoption of specific cybersecurity measures, while cybersecurity practices, in turn, aid in fulfilling compliance obligations.

Cybersecurity practices serve as tangible implementations of compliance requirements. Organisations must deploy technical and procedural safeguards to meet regulatory standards, including encryption, access controls, and regular vulnerability assessments. Conversely, adhering to compliance standards helps organisations establish a fundamental level of cybersecurity readiness, minimising the likelihood of breaches and legal repercussions.

At the heart of effective cybersecurity, GRC lies proactive compliance. Reactive approaches, waiting until a breach occurs to address compliance gaps, are…

 

point 1Navigating regulatory legal implications in the face of evolving threats

In the dynamic environment of a multinational technology corporation's bustling headquarters, a significant transformation was taking place. This transformation would redefine the organisation's cybersecurity approach, driven by Jennifer, the visionary CEO, and Thabo, an astute board member renowned for his strategic acumen.

Jennifer (CEO): Thabo, in our ever-changing digital landscape, the relationship between evolving threats and regulatory compliance has become strikingly evident. Let me share a real-world scenario with you involving a multinational financial institution. As the institution expanded its digital presence, it fell prey to a sophisticated cyber-attack orchestrated by a nation-state actor. This attack compromised customer data and exposed vulnerabilities within our defence.

Thabo (Board Member): That's quite concerning, Jennifer. It really underscores how vital it is to understand the dynamics between threats and compliance.

Jennifer (CEO): Absolutely, Thabo. The attack itself utilised advanced tactics, techniques, and procedures, revealing the growing sophistication of cyber threats. It brought to light the crucial role that boards and executives play in comprehending these evolving threats and their nuances.

Thabo (Board Member): So, this breach also had regulatory repercussions?

Jennifer (CEO): Yes, indeed. The breach triggered immediate regulatory responses due to the compromised customer data. This raised concerns about data protection laws, leading regulatory authorities to mandate thorough investigations, customer notifications, and substantial fines for non-compliance with data breach notification regulations.

Thabo (Board Member): It sounds like this incident prompted changes in our compliance framework.

Jennifer (CEO): Precisely. This incident highlighted the intricate connection between compliance, legal requirements, and cybersecurity practices. Our compliance framework needed swift adjustments to meet the ever-evolving standards set by data protection regulations.

Thabo (Board Member): But it's not all negative, right? Did this incident bring any positive changes?

Jennifer (CEO): Definitely. Despite facing regulatory fines, the incident showcased the importance of proactive compliance. By anticipating regulatory changes and aligning our cybersecurity practices accordingly, we demonstrated our commitment to safeguarding customer data and enhancing our resilience against future threats.

Thabo (Board Member): So, the incident triggered a cultural shift as well?

Jennifer (CEO): Indeed, Thabo. The incident acted as a catalyst for a cultural transformation. Recognising our pivotal role, the board and executives initiated comprehensive cybersecurity awareness programs involving all employees. It was crucial to ensure that everyone understood the seriousness of evolving threats.

Thabo (Board Member): It's a multidimensional lesson, Jennifer. What's the overarching takeaway from this scenario?

Jennifer (CEO): The incident's aftermath, combined with regulatory consequences, reinforced the significance of understanding the evolving threat landscape. It became clear that this understanding is fundamental for us as boards and executives. It guides us in resource allocation, proactive compliance measures, and communicating the urgency of cybersecurity throughout the entire organisation.

Thabo (Board Member): This real-world example really highlights the complexity of the cybersecurity GRC journey.

Jennifer (CEO): Exactly, Thabo. It exemplifies how the interplay between evolving threats, regulatory compliance, and cybersecurity practices is intricate. It underscores that a comprehensive grasp of the evolving threat landscape, coupled with proactive compliance strategies, is essential for mitigating risks, protecting sensitive data, and steering our cybersecurity GRC journey toward success.

An Introduction to Cybersecurity for the Rest of Us

An Introduction to Cybersecurity for the Rest of Us


Author: Dr Zoran Mitrovic

Description: In this e-book, through insightful

exploration and practical guidance, we seek to shed

light on the importance of cybersecurity for

everyone, regardless of technical expertise.

Intended readership: Individuals from all

professional backgrounds, ranging from technical

experts to non-technical personnel. It would be

suitable for anyone interested in understanding the

significance of cybersecurity in today's digital

landscape, regardless of their level of technical

expertise.

Pages: 57

SIGNS OF A CYBER-ATTACK: A TELL-TALE WARNING

The signs of a cyber-attack are often subtle yet significant, necessitating a vigilant eye and proactive response. Let's explore the key indicators that may signal impending cyber threats and the importance of promptly recognising and addressing them to safeguard against potential harm.

Unusual system behaviour is like your computer's way of waving a red flag, alerting you to potential cyber threats before they escalate. Think of it as your digital guardian, constantly monitoring for any signs of trouble within the fortress of your system. When your computer starts acting sluggish, crashing unexpectedly, or showing a sudden surge in network activity, it's akin to the castle gates rattling, warning of potential intruders.

Slow performance might indicate the presence of sneaky malware or unauthorised processes silently sapping your system's resources. Unexpected crashes could be…

Real-life example: Financial foul play of unexplained transactions

 

point 1Imagine you're sitting down to review your monthly bank statement, diligently checking each transaction to ensure everything aligns with your spending habits. As you scan through the list, something catches your eye – a series of transactions you don't recognise.

Withdrawals from ATMs you've never visited, purchases at stores you've never patronized, and payments to unfamiliar recipients. It's as if someone else has been using your bank account without your knowledge or consent, leaving a trail of financial breadcrumbs that lead to a potential cyber-attack.

Consider this scenario: You notice a sizable withdrawal labelled as a "cash advance" from an ATM in a city you've never been to. It's like finding a charge on your credit card for a hotel stay in a foreign country you've never visited. Confusion sets in as you try to reconcile these transactions with your

spending patterns, but the pieces don't fit. You realise that you may have fallen victim to a cybercriminal who gained unauthorised access to your bank account and siphoned off funds for their gain.

As you delve deeper into your financial records, you uncover more suspicious activity – small transactions to online merchants you've never heard of, and payments to obscure companies with cryptic names. It's like discovering charges for digital subscriptions you never signed up for, or purchases

from shady online retailers you've never interacted with. Your heart sinks as you realise the extent of the breach – your financial accounts have been compromised, and you're now grappling with the aftermath of a cyber-attack.

In this scenario, unexplained financial transactions serve as a glaring red flag, signalling that something is amiss with your accounts. It's akin to discovering unauthorised charges on your credit card statement, prompting immediate action to protect your finances and mitigate further damage.

Whether it's reporting suspicious activity to your bank, freezing your accounts, or seeking assistance from cybersecurity experts, recognising these warning signs is crucial for thwarting cyber-attacks and safeguarding your financial well-being.

Ransomware Resilience: A Comprehensive Guide based on NIST 800 Series

Ransomware Resilience: A Comprehensive Guide based on NIST 800 Series


Author: Dr Zoran Mitrovic

Description: Demystify cybersecurity for

business professionals with this accessible

introduction, backed with credible academic

references. Learn how to protect your

organisation's assets and mitigate risks in

today's interconnected world.

Intended readership: Business professionals

who may not have a technical background in

cybersecurity but are keen to understand its

importance and implications for their

organisations. This may include

executives, managers, entrepreneurs,

consultants, and individuals involved in

decision-making processes within

businesses of various sizes and industries.

Pages: 169

PURPOSE AND STRUCTURE OF THE BOOK

The primary purpose of this book is to empower organisations with the knowledge and tools needed to build robust ransomware resilience programmes. As we've discussed in earlier chapters, the ransomware threat landscape is evolving rapidly, posing significant risks to organisations of all sizes and across all industries. It is no longer a question of "if" but "when" an organisation will face a ransomware attack.

The purpose of this book is to address the "when" by providing a comprehensive guide to proactively prepare for, defend against, and recover from ransomware attacks. We believe that a resilient organisation can significantly mitigate the impact of ransomware incidents and, in many cases, prevent them altogether.

To achieve the purpose of helping organisations build ransomware resilience, this book is structured as follows:

Introduction: This section sets the stage by introducing the growing threat of ransomware and the importance of ransomware resilience. It also provides an overview of the NIST 800 series and its relevance to this endeavour.

Understanding ransomware threats: In this chapter, we explore the history, evolution, and common attack vectors of ransomware. Understanding the enemy is the first step in building an effective defence.

The importance of ransomware resilience: We delve deeper into why ransomware resilience is crucial, examining the potential consequences of not being adequately prepared.

Overview of NIST 800 Series and its relevance: This chapter provides an overview of the NIST 800 series documents, highlighting their relevance to building ransomware resilience.

Security and privacy controls (NIST SP 800-53): We start our practical journey by focusing on security and privacy controls. We explore how organisations can tailor these controls to address ransomware threats effectively.

Risk assessment (NIST SP 800-30): Risk assessment is a critical component of ransomware resilience. In this chapter, we delve into the process of identifying and mitigating ransomware-related risks.

Incident handling (NIST SP 800-61): Effective incident handling is essential for Minimising the impact of ransomware attacks. We provide a structured approach to detecting, responding to, and recovering from incidents.

Protecting controlled unclassified information (CUI) (NIST SP 800-171): Many organisations handle sensitive information targeted by ransomware attackers. We explore how NIST SP 800-171 can help safeguard this data.

Threat intelligence (NIST SP 800-83): Staying ahead of ransomware threats requires insights into emerging trends. We delve into the role of threat intelligence in ransomware defence.

Building a ransomware resilience programme: This chapter offers practical guidance on building a ransomware resilience programme, including leadership, policies, training, and resource allocation.

Ransomware resilience in practice: Real-world case studies highlight organisations successfully implementing NIST-based ransomware resilience.

Future trends and challenges in ransomware defence: We explore emerging ransomware threats and evolving NIST guidelines, preparing organisations for what lies ahead.

Conclusion: We summarize the book's key takeaways and emphasize the ongoing importance of ransomware resilience.

Appendices: Additional resources, templates, and checklists to aid organisations in their ransomware resilience efforts.

As you progress through this book, you will gain a comprehensive understanding of ransomware threats, the NIST 800 series, and how to apply these principles to create a ransomware-resilient organisation. Our goal is to equip you with the knowledge and tools to navigate the evolving ransomware landscape effectively and protect your organisation's data, reputation, and financial well-being.

A Practical Cybersecurity Guide for Emerging Professionals

A Practical Cybersecurity Guide for Emerging Professionals


Author: Dr Zoran Mitrovic

Description: Perfect for aspiring cybersecurity

professionals, this practical guide offers a step-by-

step approach to mastering essential cybersecurity

concepts and skills. Kickstart your cybersecurity

journey with confidence and clarity.

Intended readership: Individuals interested in

entering the field of cybersecurity, such as students

studying computer science or cybersecurity, recent

graduates looking to begin a career in

cybersecurity, as well as professionals in related

fields seeking to transition into cybersecurity roles.

Pages: 116

DETECTION STRATEGIES: UNDERSTANDING ATTACK PHASES

To effectively detect and respond to cybersecurity threats, it's imperative to understand the various phases of an attack. Cyber attackers follow a sequence of actions when targeting an organisation's systems, and by comprehending these phases, security teams can proactively identify and mitigate threats. This section delves into the typical attack phases and how detection strategies align with each of them.

Reconnaissance

Reconnaissance, the initial stage of a cyber-attack, marks the point where adversaries embark on a quest for information. In this phase, attackers aim to gather essential data about their target, such as identifying potential weaknesses, mapping out the network's structure, and profiling potential points of…

 

point 1Practical example: Detection strategies

Let's consider an example of how detection strategies can work in the context of a cybersecurity incident:

Scenario: Phishing Attack Detection

Reconnaissance phase detection: In the reconnaissance phase, attackers may scan an organisation's email infrastructure to identify potential targets. The detection strategy here involves monitoring email logs for unusual access patterns, such as a sudden increase in login attempts from unfamiliar locations.

Initial access phase detection: When the attacker attempts to gain initial access through a phishing email, the detection strategy involves monitoring email gateways for suspicious email attachments or links. Advanced threat detection solutions can analyse the email content for known phishing indicators.

Execution phase detection: If the attacker successfully convinces a user to click on a malicious link or open an infected attachment, the malware is executed. Detection at this stage involves endpoint detection and response (EDR) tools that monitor system processes for unusual behaviour, such as unauthorised code execution.

Persistence phase detection: After gaining access, the attacker may attempt to establish persistence by planting backdoors. Detection strategies include continuous monitoring of system changes and configurations for any unauthorised modifications.

Privilege escalation phase detection: Attackers often seek to escalate their privileges for greater control. The detection strategy in this phase involves user and entity behaviour analytics (UEBA) solutions that identify unusual privilege escalation attempts.

Lateral movement phase detection: To move laterally within the network, attackers attempt to access additional systems. Network segmentation and monitoring can detect unusual network traffic patterns and access to sensitive resources.

Data exfiltration phase detection: In the final phase, attackers exfiltrate sensitive data. Data loss prevention (DLP) solutions and intrusion detection systems (IDS) can monitor for unusual data transfers to external destinations.

Response and remediation: Effective detection strategies not only identify these phases but also trigger appropriate responses. In the case of a phishing attack, an automated response might involve isolating the affected endpoint, revoking compromised credentials, and initiating forensic analysis to understand the scope of the incident. Security teams can then proceed with remediation efforts.

Cybersecurity Risk Management

Cybersecurity Risk Management


Author: Dr Zoran Mitrovic

Description: Navigate the complex world of

cybersecurity risk management with this

authoritative guide, drawing on the best practices

outlined in NIST Special Publications 800-30, 800-

37 and 800-39.

Intended readership: Cybersecurity professionals,

risk managers, compliance officers, IT

professionals, and individuals responsible for

cybersecurity within organisations. Additionally,

executives, decision-makers, and policymakers

seeking to understand and implement effective

cybersecurity risk management practices would

also benefit from this authoritative guide.

Pages: 185

 

SECURING AN E-COMMERCE COMPANY

Let us consider an e-commerce company that relies heavily on its online platform to conduct business and handle customer transactions. In assessing the risk associated with its operations, the company evaluates both the likelihood of a threat event occurring and the potential adverse impact it may have.

For instance, a potential threat event could be a Distributed Denial of Service (DDoS) attack targeting the company's website, which could result in a temporary disruption of its online services. The likelihood of such an attack occurring is assessed based on factors like the prevalence of DDoS attacks in the industry, the company's visibility and attractiveness as a target, and the effectiveness of its security measures in mitigating such attacks.

In terms of the potential adverse impact, the company considers the various levels within the risk management hierarchy. At Tier 1, the reputation of the company could be significantly damaged if customers experience prolonged periods of service unavailability or if sensitive customer information is compromised during the attack. This could lead to a loss of customer trust and loyalty, ultimately affecting the company's financial performance.

At Tier 2, the disruption of specific mission/business processes comes into play. In this example, the DDoS attack could disrupt the company's order processing, payment processing, and inventory management systems, leading to delays in fulfilling customer orders, financial losses, and operational inefficiencies.

Lastly, at Tier 3, the resources expended in responding to the incident are considered. The company would need to allocate resources to investigate and mitigate the attack, potentially hiring cybersecurity experts or investing in additional security infrastructure. These expenditures would impact the company's operational costs and budget.

By evaluating both the likelihood and potential adverse impact of the threat event, the company can gain a comprehensive understanding of the risk involved. This allows them to prioritise their risk management efforts, implement appropriate security measures, and develop response plans to minimise the impact of such events and protect their operations, reputation, and financial well-being.

An Introduction to Cybersecurityfor Business People

An Introduction to Cybersecurity
for Business People


Author: Dr Zoran Mitrovic

Description: Demystify cybersecurity for

business professionals with this accessible

introduction, backed with credible academic

references. Learn how to protect your

organisation's assets and mitigate risks in

today's interconnected world.

Intended readership: Business professionals

who may not have a technical background in

cybersecurity but are keen to understand its

importance and implications for their

organisations. This may include

executives, managers, entrepreneurs,

consultants, and individuals involved in

decision-making processes within

businesses of various sizes and industries.

Pages: 169

INSIDER ATTACKS

Security risks posed by employees of an organisation to their employers are known as insider threats. An insider attack can be also defined as a malicious attack perpetrated on a network or computer system by individuals that have authorised access to an organisational information system. Insiders have a distinct advantage over external attackers for two reasons: they have authorised system access and may be familiar with the organisational system network architecture and system policies and procedures.

Furthermore, many organisations have in place fewer security mechanisms against insider attacks than those focusing on external attacks. Hence, an insider attack can easily make an information system inoperable or exploitable since they know the system very well. The hardest attack to defend against is when an attacker has direct access to a computer or many computers or even physical access to the server room.

Inside attackers can be dissatisfied employees or deliberately meaning personnel who might not have the organisation’s best interests at heart but also ex-employees disappointed or frustrated with their previous organisations.

 

point 1Detrimental outgoing emails

Imagine if one of the employees in your organisation gets an email asking that person to log in to a seemingly legitimate website to resolve some issue with that email account. Unsuspiciously, the employee clicks on a bogus link and provides his or her login details.

Now the attackers have the employee’s login details and can freely read the email correspondence. Many other colleagues and outside connections will probably get emails containing malicious links, malicious attachments or other malware, including ransomware.

Who would then be blamed for the betrayed trust between colleagues, partners, and other third parties for exposing their sensitive data? Not just that particular employee but the whole organisation.

The destructive email comments of an unhappy or disgraced employee about his or her organisation will certainly not be well received by customers and business partners. They would most likely reconsider doing business with that organisation.

Or what would happen if the financial manager mistakenly distributes bulk emails with an attachment that includes salary and bonus information for the entire organisation? It is not difficult to imagine the damage such a mistake can do to an organisation.

Building Cybersecurity Awareness: An Introduction

Building Cybersecurity Awareness: An Introduction


Author: Dr Zoran Mitrovic

Description: Lay the foundation for a

cybersecurity conscious culture with this

introductory guide. Designed for

individuals and organisations

alike, this e-book promotes awareness

and understanding of cybersecurity

principles.

Intended readership: Employees at all

levels within organisations, from frontline

staff to executives, as well as small

businesses, start-ups, educational

institutions, and non-profit organisations.

Additionally, individuals interested in

enhancing their personal cybersecurity

knowledge and practices would find

value in this introductory guide.

Pages: 68

Once the awareness programme has been designed, supporting material should be developed minding the following questions:

  • What behaviour do we want to force or reinforce?

  • What do we want all personnel to be aware of regarding cybersecurity?

The message conveyed by the cybersecurity awareness session can come from one or a number of the addressed topics that the audience should be aware of (see the list of possible topics in appendix A). The focus should be on specific, current and interesting topics that the participants should integrate into their jobs. However, as the cybersecurity landscape constantly changes, new topics should be…

 

point 1Top 10 security awareness training topics

When designing a cybersecurity training program, it is important to ensure that it covers the cyber threats that an organisation is most likely to face (Infosec, 2020):

*        Email scams: Phishing attacks are the most common method that cybercriminals use to gain access to an organisation’s network. They take advantage of human nature to trick their target into falling for the scam by offering some incentive (free stuff, a business opportunity and so on) or creating a sense of urgency.

*        Malware: It can be delivered to an organisation in several different ways, including phishing emails, drive-by downloads and malicious removable media. Employee security awareness training on malware should cover common delivery methods, threats and impacts to the organization.

*        Password security: Most employees have dozens of online accounts that are accessed by providing a username (often their email address) and a password. Hence, poor password security is one of the biggest threats to modern enterprise security.

*        Removable media: Removable media (such as USBs, CDs and so on) are a useful tool for cybercriminals since they enable malware to bypass an organization’s network-based security defences. Malicious removable media can be distributed by being dropped in parking lots and common areas or being handed out at conferences and other public events.

*        Safe Internet habits: The secure usage of the internet is of paramount importance for companies. Security training programs should incorporate safe internet habits that prevent attackers from penetrating your corporate network.

*        Social networking dangers: Unfortunately, cybercriminals use social media for attacks that put an organisation’s systems and reputation at risk. To prevent the loss of critical data, the enterprise must have a viable social networking training program that should limit the use of social networking and inform employees of the threats of social media.

*        Physical security and environmental controls: Security awareness isn’t just about what resides in your company’s computers or handheld devices. Employees should be aware of potential security risks in physical aspects of the workplace, such as visitors or new hires watching as employees type in passwords (known as “shoulder surfing”) or leaving one’s computer on and not password-protected when leaving work for the night.

*        Clean desk policy:  Sensitive information on a desk such as sticky notes, papers and printouts can easily be taken by thieving hands and seen by prying eyes. A clean desk policy should state that information visible on a desk should be limited to what is currently necessary. Before leaving the workspace for any reason, all sensitive and confidential information should be securely stored.

*        Data management and privacy: Most organisations collect, store and process a great deal of sensitive information. This includes customer data, employee records, business strategies and other data important to the proper operation of the business. If any of this data is publicly exposed or accessible to a competitor or cybercriminal, then the organization may face significant regulatory penalties, damage to consumer relationships and a loss of competitive advantage.

*        Bring-your-own-device (BYOD) policy: BYOD policies enable employees to use their devices in the workplace. While this can improve efficiency - by enabling employees to use the devices that they are most comfortable with - it also creates potential security risks.

Implementing NIST Framework

Implementing NIST Framework


Author: Dr Zoran Mitrovic

Description: This concise guide to seven

implementation steps is tailored for government

contexts, this concise guide breaks down the

implementation steps of the NIST Framework,

providing practical insights and strategies for

effective execution.

Intended readership: individuals involved in

cybersecurity within government agencies or

organisations operating within governmental

contexts: cybersecurity professionals, IT

managers, compliance officers, and policymakers

responsible for implementing cybersecurity

frameworks and strategies aligned with

government regulations and standards.

Pages: 26

CREATE TARGET PROFILE

Based on the findings of the risk assessment, the organisation develops a target profile for its cybersecurity efforts. The target profile represents the desired state of cybersecurity for the organisation. It includes the cybersecurity outcomes and priorities the organisation aims to achieve to mitigate identified risks effectively.

Practical example: Create a Target profile in a Government Department

After conducting the risk assessment, the Department of Information Technology (DIT) creates a target profile to guide its cybersecurity efforts. Here's how they develop the target profile:

Identifying cybersecurity outcomes

The DIT identifies specific cybersecurity outcomes that align with the organisation's mission and business objectives. For example, one of the outcomes could be to reduce the number of successful phishing attacks by 50% within the next year.

Prioritising mitigation strategies

Based on the risk assessment results, the DIT prioritises risk mitigation strategies that will help achieve the desired outcomes. For instance, they may focus on enhancing employee cybersecurity awareness training to reduce the likelihood of successful phishing attempts.

Defining security controls and policies

The target profile includes a set of security controls and policies that the DIT plans to implement. These controls may include multi-factor authentication, encryption of sensitive data, regular software patching, and network segmentation.

Setting performance metrics

To measure the effectiveness of the target profile, the DIT sets specific performance metrics and key performance indicators (KPIs). For instance, they may track the percentage of systems with up-to-date security patches as an indicator of patch management effectiveness.

Allocating resources

The DIT allocates resources, such as budget and personnel, to implement the target profile effectively. They ensure that the necessary tools, technologies, and personnel are available to support cybersecurity initiatives.

Establishing a timeline

The target profile includes a timeline for implementing various cybersecurity initiatives. The DIT sets realistic deadlines for each milestone to ensure steady progress towards achieving the desired outcomes.

Ensuring compliance

The target profile aligns with relevant cybersecurity regulations and standards. The DIT ensures that its cybersecurity efforts comply with applicable laws and industry best practices.

Communicating the Target profile

The DIT communicates the target profile to all relevant stakeholders, including senior management, IT personnel, and employees. This ensures that everyone is aware of the cybersecurity objectives and their role in achieving them.

Collage Shades of Cybersecurity

Collage Shades of Cybersecurity


Author: Dr Zoran Mitrovic

Description: Perfect for aspiring cybersecurity

professionals, this practical guide offers a step-by-

step approach to mastering essential cybersecurity

concepts and skills. Kickstart your cybersecurity

journey with confidence and clarity.

Intended readership: Individuals interested in

entering the field of cybersecurity, such as students

studying computer science or cybersecurity, recent

graduates looking to begin a career in

cybersecurity, as well as professionals in related

fields seeking to transition into cybersecurity roles.

Pages: 116

DEEPFAKE: FAKE NEWS ON STEROIDS

Instead of being mostly textual, the fake news era brings digitally altered video and audio also known as deepfakes. These have a real potential to further erode already undermined public trust in journalism and also to cause serious security impediments.

The term deepfake was first coined on the online platform Reddit in 2017 by an anonymous user who called himself “deepfakes”. It was coined out of two terms “deep learning” and “fake” and represents a technique for human image synthesis based on artificial intelligence. It is used to combine and superimpose existing images and videos onto source images or videos using a machine learning technique known as Generative Adversarial Network (GNA).

The Generative Adversarial Networks were invented in 2014 and are based on artificial intelligence, which powers deepfake videos and audio. In short, the GANs are made up of two rival computer networks, which use the synthesiser and detector (discriminator) to create the deepfake content.

Experts believe that there can be found about 10,000 deepfake videos circulating…

Can ordinary people be a target?

A simple answer is: yes. This is due to the plentifully available photo, video and audio material on various social media platforms such as Facebook or Instagram. Hence, anyone can become a potential target.

Unfortunately, currently, the most imminent threat of deepfakes comes from weaponizing them against women. Thus far experience shows that the deepfake makers use women’s faces without consent and paste it on pornographic content. This humiliating tendency is described as “revenge porn”. A viral deepfake video can reach an audience of millions and make headlines within a matter of hours but proving after the fact…

Dear Board MembersWe are under Attack!

Dear Board Members
We are under Attack!


Authors: Prof Zoran Mitrovic & Prof Colin Thakur

Description: Addressing boards and

executives directly, this e-book provides

actionable advice and real-world examples to

help leaders understand and mitigate cyber

risks effectively in the digital age.

Intended readership: Board members,

executives, senior management personnel,

and decision-makers across various industries

who are responsible for overseeing

cybersecurity strategies and mitigating cyber

risks within their organisations.

Pages: 72

What is StormWarning! ?

 StormWarning! is a Cybersecurity consultancy. Our experienced team of cybersecurity experts provide cybersecurity assessments, cybersecurity training and cybersecurity solutions to organisations that have a high risk public profile. StormWarning! is your organisation's best defense against the ever growing cascade of innovative security threats raining down on all organisations with a public digital footprint.
CHECK OUR SCORE ON
logo scamadvisor def 2021 33a26.jpg 900x

What is Cybersecurity?

Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks. Also known as information technology (IT) security, cybersecurity measures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization. StormWarning! is constantly researching the latest cybersecurity threats and building innovative measures to prevent them.

Check us out on TrustProfile