Cyber Power

Cyber Power: Crime, Conflict and Security in Cyberspace

Published:
Content:
Author(s):
Free Standard Shipping

Purchasing Options

Hardback
$89.95 $71.96
ISBN 9781466573048
Cat# N10719
Add to cart
SAVE 20%
eBook (VitalSource)
$89.95 $62.97
ISBN 9781466573055
Cat# NE11000
Add to cart
SAVE 30%
eBook Rentals
Other eBook Options:
 
 

Features

  • Provides a broad evaluation of cybercrime and cyberconflict and discusses approaches to security that best protect individuals, companies and governments from the criminals who operate in cyberspace.
  • Takes a comprehensive approach to cybercrime breaking down the discussion in terms of the impact on citizens, organisations and the state
  • Discusses of the civil-military and personal-corporate axes of perspective

Summary

Most books on cybercrime are written by national security or political experts, and rarely propose an integrated and comprehensive approach to cybercrime, cyber-terrorism, cyber-war and cyber-security. This work develops approaches to crucial cyber-security issues that are non-political, non-partisan, and non-governmental. It informs readers through high-level summaries and the presentation of a consistent approach to several cyber-risk related domains, both from a civilian and a military perspective. Explaining fundamental principles in an interdisciplinary manner, it sheds light on the societal, economic, political, military, and technical issues related to the use and misuse of information and communication technologies.

Table of Contents

Preface and Acknowledgement
Acknowledgement
Dedication
Foreword
Cybercrime and Cybersecurity Issues: Stakes and Challenges for the 21st Century
Understanding the context
The risks and the needs
Supporting and developing the digital society
Cybersecurity expectations
Summary
Exercises
Cyberspace and Internet: a New Paradigm for Crime and Conflicts
Understanding the context
The characteristics of cybercrimes
The Internet: empowering criminals
Summary in 10 tips
Exercises
Cybercrimes Against Persons
Understanding the context
Affecting people’s dignity and integrity
Swindles and frauds over the Internet
Identity crimes
Privacy related offences
Technological innovation and responsibility
Summary
Exercices
Cybercrimes Against Assets
Understanding the context
The typology of the main crimes against assets
Frauds and scams
Summary of offences from a technological perspective
Case study from the FBI
Exercises
Cybercrimes Against States
Understanding the context
Examples of cybercriminal activities that can affect states
Cyberthreats against states
Summary
Exercises
Cyberconflicts, Cyberwars and Cyberpower
Understanding the context
From cybercrime to cyberwar
Cyberwar
Information war
Cyberterrorism: a particular kind of cyberconflict
Cybercrime or cyber conflict
Summary
Exercises
Understanding Cybercriminals
Understanding the context
Towards a classification of cybercriminals
About hacking and hackers
Hackers’ conventions, contests, and school
Portraits of hackers
Summary
Exercices
The Cybercriminal’s Toolkits
Understanding the context
Fundamental principles and constant factors of cyberattacks
Spam and phishing: assets for criminals
Means of obtaining connection parameters to access systems
Some basic attacks
The black market of cybercriminality
Summary
Exercises
The Fight Against Cybercrime
Understanding the context
Strengthening legislation is not enough
An integrative approach and a global strategy
The principal challenges in combating cybercrime at the international level
Some privacy related considerations
Summary
Exercises
The Global Cybercrime Ecosystem and Cybercriminal Investigation
Understanding the context
The place of the struggle against cybercriminality in the cybercriminal ecosystem
Cybercriminal investigation
The idea of digital evidence
Fundamental concepts in computer crime investigation
Investigating computer crimes within organizations
Summary
Exercises
A Global Approach to Cybersecurity
Understanding the context
The evolution of information security
Avoiding the cybersecurity gap
A systemic approach to cybersecurity
Summary
Exercises
Cybersecurity Governance and Security Measures
Understanding the context
Managing the risks
Defining a security policy
Understanding ICT security from a technical point of view
A functional approach to generic security tools
Cyber security as a competitive advantage
Summary
Exercises
Cyberconflict & Cybercrime: Prospects for a Global Response
Understanding the context
Some complex and global questions
For an international treaty: a contribution to stability in cyberspace
Connecting the world responsibly
Summary
Exercises
Glossary of main cybercrime and cybersecurity related terms
Annex: Some references
Index

 
Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press Pinterest Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us