Cybersecurity Threats: Past and Present

  • Ganna PogrebnaEmail author
  • Mark Skilton


In this chapter we present our topology of cyberthreats, which we call the Periodic Table of Cyberthreats. We provide a brief history of cyberthreats and cybercrimes, complementing our narrative with the real-world examples. We conclude that the majority of threats, observed today, have existed for decades and what we seem to encounter now are new versions of existing criminal methods. We also distinguish between cybersecurity threats, vulnerabilities, and risks and describe the links and dependencies between them.


  1. 1.
    Brenner, S. W. (2007). History of computer crime. In The history of information security (pp. 705–721). Amsterdam: Elsevier.CrossRefGoogle Scholar
  2. 2.
    DeNardis, L. (2007). A history of internet security. In The history of information security (pp. 681–704). Amsterdam: Elsevier.CrossRefGoogle Scholar
  3. 3.
    Nakamoto, S. (2009, May 24). Bitcoin: A peer-to-peer electronic cash system (PDF). Archived from the original on 20 March 2014. Retrieved 5 March 2014.Google Scholar
  4. 4.
    Nakamoto, S. (2008, 31 October). Bitcoin P2P e-cash paper. Archived from the original on 28 December 2012. Retrieved 5 March 2014.Google Scholar
  5. 5.
    Kharlamov, A., Parry, G., & Pogrebna, G. (2018). Measuring vulnerability towards cybersecurity Risks (Working Paper).Google Scholar
  6. 6.
    May, R. (2018). The human firewall: Cybersecurity is not just an IT problem (Kindle Edition).Google Scholar
  7. 7.
    Evans, K., & Reeder, F. (2010). A human capital crisis in cybersecurity: Technical proficiency matters. Washington, DC: CSIS.Google Scholar

Copyright information

© The Author(s) 2019

Authors and Affiliations

  1. 1.University of BirminghamBirminghamUK
  2. 2.The Alan Turing InstituteLondonUK
  3. 3.Warwick Business SchoolUniversity of WarwickCoventryUK

Personalised recommendations