Skip to main content Skip to main navigation
  1. Home
  2. Computer Science & IT
  3. Cybercrime: Vandalizing the Information Society

Cybercrime: Vandalizing the Information Society, 1st edition

  • Steven Furnell

Published by Addison-Wesley Professional (December 6th 2001) - Copyright © 2002

1st edition

Unfortunately, this item is not available in your country.

Overview

This book seeks to explore the problem of cybercrime, which is a continual and increasing threat to the information society. The author presents the hacker culture and also considers hacktivism and cyberterrorism; the trend towards hiring hackers to test systems; the role of hacking in next-generation warfare; and today's most important countermeasures.

Table of contents

(NOTE: Each chapter concludes with a Summary)

Preface.

About the author.

Acknowledgments.


1. “You are here”—Welcome to the information society.

The opportunity—The brave new world.

The dependency—Society's reliance upon information technology.

The danger—Why we need security.

Some basic principles of IT security.


2. Crime in the information society.

What is cybercrime?

Assessing the scale of the problem.

Some examples of notable incidents.


3. Hackers—Anti-heroes of the computer revolution?

Who or what is a hacker?

Phreaking out the phone company.

Stereotype and self-image.

What's the motivation?

Elements of the hacker culture.

Hackers as celebrities.


4. Delving deeper—What hackers do and how they do it.

Getting in and staying there.

Common forms of attack.

Getting the tools to do it for you.

Using less technological approaches.


5. Manifestations of malware.

What is malware?

The evolution of viruses.

Notable malware incidents.

Causing problems without writing code.

Future directions for malware.


6. Societal impacts of cybercrime.

Implications for society at large.

Public attitudes and awareness.

Electronic commerce—An example of society's need for protection.

Policing the problem.

Legislating against computer crime and abuse.

The problems of enforcing the law.

Understanding the issues involved.

Global inconsistency.

Did the crime, did the time—What next?


7. Commercial and political evolution.

Hackers for hire.

Hacktivism.

Information warfare.

Cyberterrorism.

When the boot is on the other foot.


8. Where do we go from here?

Preventative measures.

Vandalizing the information society?

Glossary of terms.

Online resources for cybercrime and security.

Online news sites.

Security sites.

Hacker-related sites.

Notes on sources.


Index. 0201721597T11262001

For teachers

All the material you need to teach your courses.

Discover teaching material