Cyberspace, cybersecurity, and cybercrime. (2017)
- Record Type:
- Book
- Title:
- Cyberspace, cybersecurity, and cybercrime. (2017)
- Main Title:
- Cyberspace, cybersecurity, and cybercrime
- Further Information:
- Note: Janine Kremling, Amanda M. Sharp Parker.
- Authors:
- Kremling, Janine, 1977-
Parker, Amanda M. Sharp - Contents:
- Preface; Acknowledgments; Chapter 1 • Cyberspace, the Internet, and the World Wide Web; The Beginning of the Internet and Cyberspace; The Purpose of the Internet; Vulnerabilities of the Internet; What Distinguishes Cyberspace, the Internet, and the World Wide Web?; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Chapter 2 • What Is Cybersecurity?; Origins and Nature of Cybersecurity; Definitions; Definition of Cybersecurity; Cybersecurity Policies; Overview of Cyberspace Intrusions; Securing Your Wi-Fi in a Wireless World; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Appendix 2A; Chapter 3 • Threat Factors—Computers as Targets; The Evolution of Cybercrime; Computers as a Target; Viruses, Worms, and Trojan Horses; Preventing Malware Intrusions; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime; Cybercrimes; Fraud and Financial Crimes; Cyberbullying; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Chapter 5 • Threats to Cybersecurity by Hacktivists and Nation-States; Threats to Cybersecurity; What Motivates Hackers?; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Chapter 6 • National Security: Cyberwarfare and Cyberespionage; Cyberwarfare; Nation-State Threats by Region; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading;Preface; Acknowledgments; Chapter 1 • Cyberspace, the Internet, and the World Wide Web; The Beginning of the Internet and Cyberspace; The Purpose of the Internet; Vulnerabilities of the Internet; What Distinguishes Cyberspace, the Internet, and the World Wide Web?; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Chapter 2 • What Is Cybersecurity?; Origins and Nature of Cybersecurity; Definitions; Definition of Cybersecurity; Cybersecurity Policies; Overview of Cyberspace Intrusions; Securing Your Wi-Fi in a Wireless World; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Appendix 2A; Chapter 3 • Threat Factors—Computers as Targets; The Evolution of Cybercrime; Computers as a Target; Viruses, Worms, and Trojan Horses; Preventing Malware Intrusions; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime; Cybercrimes; Fraud and Financial Crimes; Cyberbullying; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Chapter 5 • Threats to Cybersecurity by Hacktivists and Nation-States; Threats to Cybersecurity; What Motivates Hackers?; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Chapter 6 • National Security: Cyberwarfare and Cyberespionage; Cyberwarfare; Nation-State Threats by Region; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Chapter 7 • Cyberterrorism; Cyberterrorism Defined; The Role of the Media; Evolution of the Threat; Technology Use by Extremists; Targets of Cyberterrorism; Risk Management; Damage Potential; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Chapter 8 • An Evolving Threat: The Deep Web; The Surface Web; The Deep Web and Darknets; Accessibility; Products Available; Payment: Cryptocurrency; Law Enforcement Response; Operation Onymous; Anonymous and “Vigilante Justice”; Terrorist Presence on the Deep and Dark Web; Legal Issues; Summary; Key Terms; Discussion Questions; Internet Resources; Court Cases; Chapter 9 • Cybersecurity Operations; Theoretical Operations; Learning Theory; Differential Association Theory; Subculture Theory; DEF CON Convention; Law Enforcement Operations; Target Hardening; Honeypots, Nets, and Tokens; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Chapter 10 • Cybersecurity Policies and Legal Issues; National Cybersecurity Policies; International Cybersecurity Policies; Legal Issues; Issues With Enforcement/Jurisdiction; Summary; Key Term; Discussion Questions; Internet Resources; Further Reading; Chapter 11 • What the Future Holds; Data Is the New Oil; Emerging Threats; Vulnerable Targets; Potential/Emerging Perpetrators; Summary; Key Terms; Discussion Questions; Internet Resources; Further Reading; Appendix: Cybersecurity-Related Organizations; Glossary; Notes; Index; About the Authors; … (more)
- Edition:
- 1st
- Publisher Details:
- Los Angeles : SAGE
- Publication Date:
- 2017
- Extent:
- 1 online resource
- Subjects:
- 364.168
Computer crimes
Cyberspace
Computer networks -- Security measures - Languages:
- English
- ISBNs:
- 9781506392288
- Notes:
- Note: Description based on CIP data; resource not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.188744
- Ingest File:
- 02_227.xml