A Quick Perspective on the Current State in Cybersecurity

Nowadays, cybersecurity makes headlines across the media and in companies, blogs, social networks, among other places. The Internet is a wild cyberspace, an arena for commercialization, consumerism, business, and leisure, to name a few activities. Networks, populations, and nations around the world, now interconnected through the Internet, rely on it for their daily lives. But some Internet users have learned to take advantage of vulnerable systems and of Internet technologies for their own good, sending out spam, phishing, data breaches, botnets, and other threats. An underground criminal network has emerged, creating complex malware kits for several purposes. “Hacktivism” has become a popular term with many supporters worldwide, but cyberwarfare is now on the rise, gaining more and more attention from nation-states. This chapter provides a quick overview of these topics, discussing them in a timely manner, referencing key events from the past while focusing on the present day.

[1]  Richard J. Enbody,et al.  Targeted Cyberattacks: A Superset of Advanced Persistent Threats , 2013, IEEE Security & Privacy.

[2]  Clifford Stoll,et al.  Stalking the wily hacker , 1988, CACM.

[3]  Herbert Bos,et al.  SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets , 2013, 2013 IEEE Symposium on Security and Privacy.

[4]  Ken Thompson,et al.  Reflections on trusting trust , 1984, CACM.

[5]  Helge Janicke,et al.  Cyber warfare: Issues and challenges , 2015, Comput. Secur..

[6]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[7]  Mat Honan 29. How Apple and Amazon Security Flaws Led to My Epic Hacking , 2013 .

[8]  Steve Mansfield-Devine Security review: the past year , 2013 .

[9]  Sean Watts The notion of combatancy in cyber warfare , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).

[10]  Edward Amoroso From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud , 2013, IEEE Security & Privacy.

[11]  Mariarosaria Taddeo,et al.  An analysis for a just cyber warfare , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).