Cybercrime and Cyber Warfare

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cybercrime and Cyber Warfare by Igor Bernik, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Igor Bernik ISBN: 9781118899090
Publisher: Wiley Publication: February 19, 2014
Imprint: Wiley-ISTE Language: English
Author: Igor Bernik
ISBN: 9781118899090
Publisher: Wiley
Publication: February 19, 2014
Imprint: Wiley-ISTE
Language: English

In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators’ activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace.
The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators, their motives and their organizations. Tools for implementing attacks are also briefly mentioned, however this book is not technical and does not intend to instruct readers about the technical aspects of cybercrime, but rather focuses on managerial views of cybercrime. Other sections of this chapter deal with the protection against attacks, fear, investigation and the cost of cybercrime. Relevant legislation and legal bodies, which are used in cybercrime, are briefly described at the end of the chapter.
The second chapter deals with cyberwarfare and explains the difference between classic cybercrime and operations taking place in the modern inter-connected world. It tackles the following questions: who is committing cyberwarfare; who are the victims and who are the perpetrators? Countries which have an important role in cyberwarfare around the world, and the significant efforts being made to combat cyberwarfare on national and international levels, are mentioned.
The common points of cybercrime and cyberwarfare, the methods used to protect against them and the vision of the future of cybercrime and cyberwarfare are briefly described at the end of the book.

Contents

  1. Cybercrime.
  2. Cyberwarfare.

About the Authors

Igor Bernik is Vice Dean for Academic Affairs and Head of the Information Security Lab at the University of Maribor, Slovenia. He has written and contributed towards over 150 scientific articles and conference papers, and co-authored 4 books. His current research interests concern information/cybersecurity, cybercrime, cyberwarfare and cyberterrorism.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators’ activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace.
The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators, their motives and their organizations. Tools for implementing attacks are also briefly mentioned, however this book is not technical and does not intend to instruct readers about the technical aspects of cybercrime, but rather focuses on managerial views of cybercrime. Other sections of this chapter deal with the protection against attacks, fear, investigation and the cost of cybercrime. Relevant legislation and legal bodies, which are used in cybercrime, are briefly described at the end of the chapter.
The second chapter deals with cyberwarfare and explains the difference between classic cybercrime and operations taking place in the modern inter-connected world. It tackles the following questions: who is committing cyberwarfare; who are the victims and who are the perpetrators? Countries which have an important role in cyberwarfare around the world, and the significant efforts being made to combat cyberwarfare on national and international levels, are mentioned.
The common points of cybercrime and cyberwarfare, the methods used to protect against them and the vision of the future of cybercrime and cyberwarfare are briefly described at the end of the book.

Contents

  1. Cybercrime.
  2. Cyberwarfare.

About the Authors

Igor Bernik is Vice Dean for Academic Affairs and Head of the Information Security Lab at the University of Maribor, Slovenia. He has written and contributed towards over 150 scientific articles and conference papers, and co-authored 4 books. His current research interests concern information/cybersecurity, cybercrime, cyberwarfare and cyberterrorism.

More books from Wiley

Cover of the book House of Cards and Philosophy by Igor Bernik
Cover of the book Novel Delivery Systems for Transdermal and Intradermal Drug Delivery by Igor Bernik
Cover of the book Electrospinning by Igor Bernik
Cover of the book Manager's Guide to Compliance by Igor Bernik
Cover of the book Essential Physiological Biochemistry by Igor Bernik
Cover of the book Nonresponse in Household Interview Surveys by Igor Bernik
Cover of the book Metallabenzenes by Igor Bernik
Cover of the book The 50 Biggest Estate Planning Mistakes...and How to Avoid Them by Igor Bernik
Cover of the book Neoliberalism by Igor Bernik
Cover of the book Windows 8 For Dummies, Pocket Edition by Igor Bernik
Cover of the book Tree-based Graph Partitioning Constraint by Igor Bernik
Cover of the book CWNA Certified Wireless Network Administrator Study Guide by Igor Bernik
Cover of the book Extraordinary Outcomes by Igor Bernik
Cover of the book Portfolio Management by Igor Bernik
Cover of the book Technology and Practical Use of Strain Gages by Igor Bernik
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy