(NOTE: Each chapter concludes with a Summary
About the author.
Acknowledgments. 1. “You are here”—Welcome to the information society.
The opportunity—The brave new world.
The dependency—Society's reliance upon information technology.
The danger—Why we need security.
Some basic principles of IT security. 2. Crime in the information society.
What is cybercrime?
Assessing the scale of the problem.
Some examples of notable incidents. 3. Hackers—Anti-heroes of the computer revolution?
Who or what is a hacker?
Phreaking out the phone company.
Stereotype and self-image.
What's the motivation?
Elements of the hacker culture.
Hackers as celebrities. 4. Delving deeper—What hackers do and how they do it.
Getting in and staying there.
Common forms of attack.
Getting the tools to do it for you.
Using less technological approaches. 5. Manifestations of malware.
What is malware?
The evolution of viruses.
Notable malware incidents.
Causing problems without writing code.
Future directions for malware. 6. Societal impacts of cybercrime.
Implications for society at large.
Public attitudes and awareness.
Electronic commerce—An example of society's need for protection.
Policing the problem.
Legislating against computer crime and abuse.
The problems of enforcing the law.
Understanding the issues involved.
Did the crime, did the time—What next? 7. Commercial and political evolution.
Hackers for hire.
When the boot is on the other foot. 8. Where do we go from here?
Vandalizing the information society?
Glossary of terms.
Online resources for cybercrime and security.
Online news sites.
Notes on sources. Index. 0201721597T11262001