2 options
Cybercrime and cyberwarfare / Igor Bernik.
- Format:
- Book
- Author/Creator:
- Bernik, Igor.
- Series:
- Focus series in information systems, web and pervasive computing.
- FOCUS Information Systems, Web and Pervasive Computing Series, 2051-249X
- Language:
- English
- Subjects (All):
- Computer crimes--Prevention.
- Computer crimes.
- Cyberspace--Security measures.
- Cyberspace.
- Information warfare.
- Security systems.
- Threats--Safety measures.
- Threats.
- Physical Description:
- 1 online resource (177 p.)
- Edition:
- 1st ed.
- Place of Publication:
- London ; Hoboken, New Jersey : ISTE : Wiley, 2014.
- Language Note:
- English
- Summary:
- In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace.The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators
- Contents:
- Cover; Title Page; Contents; Introduction; Acknowledgement; Chapter 1. Cybercrime; 1.1. The perpetrators of cybercrime; 1.1.1. Motives of the perpetrators of cybercrime; 1.1.2. Types of offenders; 1.1.3. Organization of perpetrators; 1.2. Tools for implementing attacks; 1.3. System protection against attacks; 1.4. Fear of cybercrime; 1.5. Investigation of cybercrime; 1.6. Cost of cybercrime; 1.6.1. Measuring the cost of cybercrime model; 1.6.2. Cost framework for cybercrime model; 1.7. Laws and legal bodies; 1.7.1. The Council of Europe Convention on Cybercrime
- 1.7.2. Agreement on Trade-Related Aspects of Intellectual Property Rights1.7.3. Digital Millennium Copyright Act; 1.7.4. United Nations Charter; 1.8. Cybercrime conclusion; Chapter 2. Cyberwarfare; 2.1. Information and cyberspace; 2.1.1. Cyberspace and ICT; 2.1.2. Information power and information conflict; 2.2. Understanding cyberwarfare; 2.2.1. The nature of cyberwarfare; 2.2.2. Types and techniques of cyberwarfare; 2.3. Perpetrators and victims of cyberwarfare; 2.4. Committing cyberwarfare; 2.4.1. Espionage; 2.4.2. Active warfare; 2.4.3. Information operations; 2.4.4. Propaganda activity
- 2.5. Organizations and cyberwarfare2.5.1. Industrial espionage; 2.5.2. Politically and ideologically motivated groups - perpetrators of cyberwarfare; 2.6. The role of countries in cyberwarfare; 2.6.1. The United States; 2.6.2. China; 2.6.3. Russia; 2.6.4. India; 2.6.5. Iran; 2.6.6. Israel; 2.6.7. North Korea; 2.7. Efforts against cyberwarfare: international and national legislation; 2.8. Defense against cyberwarfare; 2.9. Cyberwarfare conclusion; Conclusion; Bibliography; Index
- Notes:
- Description based upon print version of record.
- Includes bibliographical references and index.
- Description based on print version record.
- ISBN:
- 1-118-89860-5
- 1-118-89895-8
- OCLC:
- 871224260
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.