サイバー空間、サイバーセキュリティとサイバー犯罪<br>Cyberspace, Cybersecurity, and Cybercrime

個数:1
紙書籍版価格
¥18,302
  • 電子書籍

サイバー空間、サイバーセキュリティとサイバー犯罪
Cyberspace, Cybersecurity, and Cybercrime

  • 言語:ENG
  • ISBN:9781506347257
  • eISBN:9781506392288

ファイル: /

Description

Presented from a criminal justice perspective, Cyberspace, Cybersecurity, and Cybercrime introduces students to the interdisciplinary field of cybercrime by exploring the theoretical, practical, and legal framework it operates under, along with strategies to combat it. Authors Janine Kremling and Amanda M. Sharp Parker provide a straightforward overview of cybercrime, cyberthreats, and the vulnerabilities individuals, businesses, and governments face everyday in a digital environment. Highlighting the latest empirical research findings and challenges that cybercrime and cybersecurity pose for those working in the field of criminal justice, this book exposes critical issues related to privacy, terrorism, hacktivism, the dark web, and much more. Focusing on the past, present, and future impact of cybercrime and cybersecurity, it details how criminal justice professionals can be prepared to confront the changing nature of cybercrime.

 

Table of Contents

Preface
Acknowledgments
Chapter 1 • Cyberspace, the Internet, and the World Wide Web
The Beginning of the Internet and Cyberspace
The Purpose of the Internet
Vulnerabilities of the Internet
What Distinguishes Cyberspace, the Internet, and the World Wide Web?
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 2 • What Is Cybersecurity?
Origins and Nature of Cybersecurity
Definitions
Definition of Cybersecurity
Cybersecurity Policies
Overview of Cyberspace Intrusions
Securing Your Wi-Fi in a Wireless World
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Appendix 2A
Chapter 3 • Threat Factors—Computers as Targets
The Evolution of Cybercrime
Computers as a Target
Viruses, Worms, and Trojan Horses
Preventing Malware Intrusions
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime
Cybercrimes
Fraud and Financial Crimes
Cyberbullying
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 5 • Threats to Cybersecurity by Hacktivists and Nation-States
Threats to Cybersecurity
What Motivates Hackers?
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 6 • National Security: Cyberwarfare and Cyberespionage
Cyberwarfare
Nation-State Threats by Region
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 7 • Cyberterrorism
Cyberterrorism Defined
The Role of the Media
Evolution of the Threat
Technology Use by Extremists
Targets of Cyberterrorism
Risk Management
Damage Potential
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 8 • An Evolving Threat: The Deep Web
The Surface Web
The Deep Web and Darknets
Accessibility
Products Available
Payment: Cryptocurrency
Law Enforcement Response
Operation Onymous
Anonymous and “Vigilante Justice”
Terrorist Presence on the Deep and Dark Web
Legal Issues
Summary
Key Terms
Discussion Questions
Internet Resources
Court Cases
Chapter 9 • Cybersecurity Operations
Theoretical Operations
Learning Theory
Differential Association Theory
Subculture Theory
DEF CON Convention
Law Enforcement Operations
Target Hardening
Honeypots, Nets, and Tokens
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Chapter 10 • Cybersecurity Policies and Legal Issues
National Cybersecurity Policies
International Cybersecurity Policies
Legal Issues
Issues With Enforcement/Jurisdiction
Summary
Key Term
Discussion Questions
Internet Resources
Further Reading
Chapter 11 • What the Future Holds
Data Is the New Oil
Emerging Threats
Vulnerable Targets
Potential/Emerging Perpetrators
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Appendix: Cybersecurity-Related Organizations
Glossary
Notes
Index
About the Authors