Cyberspace, Cybersecurity, and Cybercrime
Autor Janine Kremling, Amanda M. Sharp Parkeren Limba Engleză Paperback – 17 dec 2017
Preț: 543.40 lei
Preț vechi: 670.86 lei
-19% Nou
Puncte Express: 815
Preț estimativ în valută:
104.01€ • 108.40$ • 86.58£
104.01€ • 108.40$ • 86.58£
Carte disponibilă
Livrare economică 16-30 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781506347257
ISBN-10: 1506347258
Pagini: 296
Dimensiuni: 178 x 254 x 10 mm
Greutate: 0.46 kg
Ediția:1
Editura: SAGE Publications
Colecția Sage Publications, Inc
Locul publicării:Thousand Oaks, United States
ISBN-10: 1506347258
Pagini: 296
Dimensiuni: 178 x 254 x 10 mm
Greutate: 0.46 kg
Ediția:1
Editura: SAGE Publications
Colecția Sage Publications, Inc
Locul publicării:Thousand Oaks, United States
Cuprins
Preface
Acknowledgments
Chapter 1 • Cyberspace, the Internet, and the World Wide Web
The Beginning of the Internet and Cyberspace
The Purpose of the Internet
Vulnerabilities of the Internet
What Distinguishes Cyberspace, the Internet, and the World Wide Web?
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 2 • What Is Cybersecurity?
Origins and Nature of Cybersecurity
Definitions
Definition of Cybersecurity
Cybersecurity Policies
Overview of Cyberspace Intrusions
Securing Your Wi-Fi in a Wireless World
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Appendix 2A
Chapter 3 • Threat Factors—Computers as Targets
The Evolution of Cybercrime
Computers as a Target
Viruses, Worms, and Trojan Horses
Preventing Malware Intrusions
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime
Cybercrimes
Fraud and Financial Crimes
Cyberbullying
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 5 • Threats to Cybersecurity by Hacktivists and Nation-States
Threats to Cybersecurity
What Motivates Hackers?
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 6 • National Security: Cyberwarfare and Cyberespionage
Cyberwarfare
Nation-State Threats by Region
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 7 • Cyberterrorism
Cyberterrorism Defined
The Role of the Media
Evolution of the Threat
Technology Use by Extremists
Targets of Cyberterrorism
Risk Management
Damage Potential
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 8 • An Evolving Threat: The Deep Web
The Surface Web
The Deep Web and Darknets
Accessibility
Products Available
Payment: Cryptocurrency
Law Enforcement Response
Operation Onymous
Anonymous and “Vigilante Justice”
Terrorist Presence on the Deep and Dark Web
Legal Issues
Summary
Key Terms
Discussion Questions
Internet Resources
Court Cases
Chapter 9 • Cybersecurity Operations
Theoretical Operations
Learning Theory
Differential Association Theory
Subculture Theory
DEF CON Convention
Law Enforcement Operations
Target Hardening
Honeypots, Nets, and Tokens
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 10 • Cybersecurity Policies and Legal Issues
National Cybersecurity Policies
International Cybersecurity Policies
Legal Issues
Issues With Enforcement/Jurisdiction
Summary
Key Term
Discussion Questions
Internet Resources
Further Reading
Chapter 11 • What the Future Holds
Data Is the New Oil
Emerging Threats
Vulnerable Targets
Potential/Emerging Perpetrators
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Appendix: Cybersecurity-Related Organizations
Glossary
Notes
Index
About the Authors
Acknowledgments
Chapter 1 • Cyberspace, the Internet, and the World Wide Web
The Beginning of the Internet and Cyberspace
The Purpose of the Internet
Vulnerabilities of the Internet
What Distinguishes Cyberspace, the Internet, and the World Wide Web?
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 2 • What Is Cybersecurity?
Origins and Nature of Cybersecurity
Definitions
Definition of Cybersecurity
Cybersecurity Policies
Overview of Cyberspace Intrusions
Securing Your Wi-Fi in a Wireless World
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Appendix 2A
Chapter 3 • Threat Factors—Computers as Targets
The Evolution of Cybercrime
Computers as a Target
Viruses, Worms, and Trojan Horses
Preventing Malware Intrusions
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime
Cybercrimes
Fraud and Financial Crimes
Cyberbullying
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 5 • Threats to Cybersecurity by Hacktivists and Nation-States
Threats to Cybersecurity
What Motivates Hackers?
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 6 • National Security: Cyberwarfare and Cyberespionage
Cyberwarfare
Nation-State Threats by Region
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 7 • Cyberterrorism
Cyberterrorism Defined
The Role of the Media
Evolution of the Threat
Technology Use by Extremists
Targets of Cyberterrorism
Risk Management
Damage Potential
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 8 • An Evolving Threat: The Deep Web
The Surface Web
The Deep Web and Darknets
Accessibility
Products Available
Payment: Cryptocurrency
Law Enforcement Response
Operation Onymous
Anonymous and “Vigilante Justice”
Terrorist Presence on the Deep and Dark Web
Legal Issues
Summary
Key Terms
Discussion Questions
Internet Resources
Court Cases
Chapter 9 • Cybersecurity Operations
Theoretical Operations
Learning Theory
Differential Association Theory
Subculture Theory
DEF CON Convention
Law Enforcement Operations
Target Hardening
Honeypots, Nets, and Tokens
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 10 • Cybersecurity Policies and Legal Issues
National Cybersecurity Policies
International Cybersecurity Policies
Legal Issues
Issues With Enforcement/Jurisdiction
Summary
Key Term
Discussion Questions
Internet Resources
Further Reading
Chapter 11 • What the Future Holds
Data Is the New Oil
Emerging Threats
Vulnerable Targets
Potential/Emerging Perpetrators
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Appendix: Cybersecurity-Related Organizations
Glossary
Notes
Index
About the Authors
Notă biografică
Janine Kremling, Ph.D., has been a professor at California State University, San Bernardino, since 2008. She received Ph.D. in criminology from the University of South Florida. Dr. Kremling teaches a wide variety of classes. She has also published five books, including Cyberspace, Cybersecurity, and Cybercrime; Homeland Security; Drugs,Crime, and Justice; and Estimating Drug Use. Dr. Kremling has been studying issues pertaining to policing, especially criminal procedure and how it impacts policing. In addition, she has also extensively studied drug use and abuse and police responses.
Descriere
Presented from a criminal justice perspective, Cyberspace, Cybersecurity, and Cybercrime introduces students to the interdisciplinary field of cybercrime by exploring the theoretical, practical, and legal framework it operates under, along with strategies to combat it. Authors Janine Kremling and Amanda M. Sharp Parker provide a straightforward overview of cybercrime, cyberthreats, and the vulnerabilities individuals, businesses, and governments face everyday in a digital environment. Highlighting the latest empirical research findings and challenges that cybercrime and cybersecurity pose for those working in the field of criminal justice, this book exposes critical issues related to privacy, terrorism, hacktivism, the dark web, and much more. Focusing on the past, present, and future impact of cybercrime and cybersecurity, it details how criminal justice professionals can be prepared to confront the changing nature of cybercrime.