ebook img

Cyberspace, Cybersecurity, and Cybercrime PDF

497 Pages·2017·3.826 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Cyberspace, Cybersecurity, and Cybercrime

Cyberspace, Cybersecurity, and Cybercrime 2 3 Cyberspace, Cybersecurity, and Cybercrime Janine Kremling California State University, San Bernardino Amanda M. Sharp Parker Campbell University 4 FOR INFORMATION: SAGE Publications, Inc. 2455 Teller Road Thousand Oaks, California 91320 E-mail: [email protected] SAGE Publications Ltd. 1 Oliver’s Yard 55 City Road London EC1Y 1SP United Kingdom SAGE Publications India Pvt. Ltd. B 1/I 1 Mohan Cooperative Industrial Area Mathura Road, New Delhi 110 044 India SAGE Publications Asia-Pacific Pte. Ltd. 3 Church Street #10-04 Samsung Hub Singapore 049483 Copyright © 2018 by SAGE Publications, Inc. All rights reserved. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. Printed in the United States of America Library of Congress Cataloging-in-Publication Data Names: Kremling, Janine, 1977- author. | Parker, Amanda M. Sharp. Title: Cyberspace, cybersecurity, and cybercrime / Janine Kremling, California State University, San Bernardino, Amanda M. Sharp Parker, Campbell University. Description: First Edition. | Thousand Oaks : SAGE Publications, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2017018240 | ISBN 9781506347257 (pbk. : alk. paper) Subjects: LCSH: Information society. | Information technology—Management. | Computer crimes. | Computer crimes—Prevention. Classification: LCC HM851 .K74 2017 | DDC 303.48/33—dc23 LC record available at https://lccn.loc.gov/2017018240 This book is printed on acid-free paper. Acquisitions Editor: Jessica Miller Editorial Assistant: Jennifer Rubio Content Development Editor: Laura Kirkhuff Production Editor: Tracy Buyan Copy Editor: Diane Wainwright Typesetter: C&M Digitals (P) Ltd. 5 Proofreader: Eleni-Maria Georgiou Indexer: Robie Grant Cover Designer: Michael Dubowe Marketing Manager: Jillian Oelsen 6 Brief Contents 1. Preface 2. Acknowledgments 3. Chapter 1 • Cyberspace, the Internet, and the World Wide Web 4. Chapter 2 • What Is Cybersecurity? 5. Chapter 3 • Threat Factors—Computers as Targets 6. Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime 7. Chapter 5 • Threats to Cybersecurity by Hacktivists and Nation-States 8. Chapter 6 • National Security: Cyberwarfare and Cyberespionage 9. Chapter 7 • Cyberterrorism 10. Chapter 8 • An Evolving Threat: The Deep Web 11. Chapter 9 • Cybersecurity Operations 12. Chapter 10 • Cybersecurity Policies and Legal Issues 13. Chapter 11 • What the Future Holds 14. Appendix: Cybersecurity-Related Organizations 15. Glossary 16. Notes 17. Index 18. About the Authors 7 Detailed Contents Preface Acknowledgments Chapter 1 • Cyberspace, the Internet, and the World Wide Web • Case Study 1.1: The Dark Side of the Internet The Beginning of the Internet and Cyberspace • Case Study 1.2: The First-Ever Web Server The Purpose of the Internet Operations and Management Aspect Social Aspect Commercialization Aspect • Legal Issue 1.1: Napster: The First File Sharing Program Vulnerabilities of the Internet What Is a Vulnerability? Time and Space Lack of Barriers to Entry Anonymity/Identity Asymmetries of Cyberspace 1s and 0s • Think About It 1.1 What Distinguishes Cyberspace, the Internet, and the World Wide Web? • Legal Issue 1.2: Is It a Crime to Link to Infringed/Illegal Content? • What Can You Do? Preparing for the Job of the Future: Careers in Cybercrime and Cybersecurity ➢ Summary ➢ Key Terms ➢ Discussion Questions ➢ Internet Resources ➢ Further Reading Chapter 2 • What Is Cybersecurity? • Think About It 2.1: What Is Cybersecurity and Why Is It Important? Origins and Nature of Cybersecurity • Think About It 2.2: War Games Definitions Definition of Cybersecurity • Case Study 2.1: The Original Hacker: Kevin Mitnick Cybersecurity Policies • Case Study 2.2: FusionX 8 Overview of Cyberspace Intrusions Network-Based Attacks • Case Study 2.3: Vitek Boden Wireless Attacks Man-in-the-Middle Attacks • Legal Issue 2.1: Hacking . . . With a Body Count? ➢ Securing Your Wi-Fi in a Wireless World ➢ Summary ➢ Key Terms ➢ Discussion Questions ➢ Internet Resources ➢ Further Reading ➢ Appendix 2A Chapter 3 • Threat Factors—Computers as Targets • Case Study 3.1: The Top 10 Data Breaches The Evolution of Cybercrime Phases of Convergence Main Targets in Information Technology • Think About It 3.1: Russian Cyberspies and the 2016 Presidential Election Computers as a Target Threats to Mobile Devices • Case Study 3.2: Democratic Election Campaign—Hackers Steal Campaign Information Viruses, Worms, and Trojan Horses Viruses Risks Created by Viruses Risks to Mobile Devices • Case Study 3.3: The First Viruses Worms • Legal Issue 3.1: The Morris Worm Risks Created by Worms Trojan Horses Risks Created by Trojan Horses • Case Study 3.4: The U.S. Government Firewall Virus Preventing Malware Intrusions Antivirus Software Firewall Thoughtful User Behavior • Think About It 3.2: Pokémon Go, Cybercriminals, and Cybersecurity Encryption • What Can You Do? Encrypting Your Computer 9 Future Developments ➢ Summary ➢ Key Terms ➢ Discussion Questions ➢ Internet Resources ➢ Further Reading Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime Cybercrimes Norse Attack Map Why Do People Commit Cybercrimes? Fraud and Financial Crimes Consumer Crimes Identity Theft • What Can You Do? Counter Measures—Protecting Your Identity Phishing Scams • Case Study 4.1: Advance Fee Fraud—Nigerian Phishing Scam • What Can You Do? Countermeasures to Phishing Scams Spam Banks and Financial Corporations Botnets Logic Bombs Viruses Internet-Initiated Sexual Offending and Exploitation Internet-Initiated Sexual Offending Child Pornography • Legal Issue 4.1 Snuff Films Trafficking in Persons • Think About It 4.1: Countermeasures to Child Pornography—Operation Predator and Operation Globe Mail-Order Brides Cyberbullying Cyberharassment Cyberstalking Online Denigration Online Impersonation Online Exclusion Tools Used Social Media YouTube 10

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.