Skip to content

Cybercrime, Cyberconflict and Cyberpower

Best in textbook rentals since 2012!

ISBN-10: 146657304X

ISBN-13: 9781466573048

Edition: 2013

Authors: Solange Ghernaouti-Helie

List price: $97.95
Blue ribbon 30 day, 100% satisfaction guarantee!
Rent eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This work develops perspectives and approaches to crucial cyber-security issues that are non-political, non-partisan, and non-governmental. It informs readers through high-level summaries and the presentation of a consistent approach to several cyber-risk related domains, both from a civilian and a military perspective. It explains fundamental principles in an interdisciplinary manner, thus shedding light on the societal, economic, political, military, and technical issues related to the use and misuse of information and communication technologies.
Customers also bought

Book details

List price: $97.95
Copyright year: 2013
Publisher: CRC Press LLC
Publication date: 4/2/2013
Binding: Hardcover
Pages: 220
Size: 6.50" wide x 9.50" long x 1.25" tall
Weight: 2.134

Preface and Acknowledgement
Acknowledgement
Dedication
Foreword
Cybercrime and Cybersecurity Issues: Stakes and Challenges for the 21st Century
Understanding the context
The risks and the needs
Supporting and developing the digital society
Cybersecurity expectations
Summary
Exercises
Cyberspace and Internet: a New Paradigm for Crime and Conflicts
Understanding the context
The characteristics of cybercrimes
The Internet: empowering criminals
Summary in 10 tips
Exercises
Cybercrimes Against Persons
Understanding the context
Affecting people's dignity and integrity
Swindles and frauds over the Internet
Identity crimes
Privacy related offences
Technological innovation and responsibility
Summary
Exercices
Cybercrimes Against Assets
Understanding the context
The typology of the main crimes against assets
Frauds and scams
Summary of offences from a technological perspective
Case study from the FBI
Exercises
Cybercrimes Against States
Understanding the context
Examples of cybercriminal activities that can affect states
Cyberthreats against states
Summary
Exercises
Cyberconflicts, Cyberwars and Cyberpower
Understanding the context
From cybercrime to cyberwar
Cyberwar
Information war
Cyberterrorism: a particular kind of cyberconflict
Cybercrime or cyber conflict?
Summary
Exercises
Understanding Cybercriminals
Understanding the context
Towards a classification of cybercriminals
About hacking and hackers
Hackers' conventions, contests, and school
Portraits of hackers
Summary
Exercices
The Cybercriminal's Toolkits
Understanding the context
Fundamental principles and constant factors of cyberattacks
Spam and phishing: assets for criminals
Means of obtaining connection parameters to access systems
Some basic attacks
The black market of cybercriminality
Summary
Exercises
The Fight Against Cybercrime
Understanding the context
Strengthening legislation is not enough
An integrative approach and a global strategy
The principal challenges in combating cybercrime at the international level
Some privacy related considerations
Summary
Exercises
The Global Cybercrime Ecosystem and Cybercriminal Investigation
Understanding the context
The place of the struggle against cybercriminality in the cybercriminal ecosystem
Cybercriminal investigation
The idea of digital evidence
Fundamental concepts in computer crime investigation
Investigating computer crimes within organizations
Summary
Exercises
A Global Approach to Cybersecurity
Understanding the context
The evolution of information security
Avoiding the cybersecurity gap
A systemic approach to cybersecurity
Summary
Exercises
Cybersecurity Governance and Security Measures
Understanding the context
Managing the risks
Defining a security policy
Understanding ICT security from a technical point of view
A functional approach to generic security tools
Cyber security as a competitive advantage
Summary
Exercises
Cyberconflict & Cybercrime: Prospects for a Global Response
Understanding the context
Some complex and global questions
For an international treaty: a contribution to stability in cyberspace
Connecting the world responsibly
Summary
Exercises
Glossary of main cybercrime and cybersecurity related terms
Annex: Some references
Index