デジタル犯罪の脅威<br>Hacked, Attacked, & Abused : Digital Crime Exposed

デジタル犯罪の脅威
Hacked, Attacked, & Abused : Digital Crime Exposed

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 290 p.
  • 言語 ENG
  • 商品コード 9780749438746
  • DDC分類 364.168

基本説明

Re-launched by the cancellation of "Dot.con" (0-7494-3673-5).

Full Description


We live in a world that has changed beyond recognition in the last ten years: it is almost possible to live your entire life online or through technology. But just like in real life, with this hi-tech existence come risks and a shadowy side. The tremendous advances and opportunities that technology has delivered have also opened up a Pandora's Box of possibilities for darker deeds. Terrorists, organized criminals, fraudsters and money launderers have all jumped at the opportunities offered them. In the meantime, hackers, crackers and virus creators have tried and succeeded in subverting the online environment. Pornography, paedophilia, hate sites, grudge sites, terrorist information - it's all there in glorious detail on the Internet. "Hacked, Attacked and Abused" is an in-depth expose of this Internet underbelly. Expert author Peter Lilley gives a compelling account of the risks inherent in our reliance on technology. He provides an overview and evaluation of crime, fraud and risk in the digital age by exploring how we got where we are now, where we are going and what risks we face in the future.Major themes covered include: the development of technology and the way it has impacted on our personal and business lives; forms of attack and the use of technology to facilitate illegal activities; the Internet and the way it lends itself to abuse so readily; information warfare - the use of technology to attack other nations - and its relevance as a business tool; the loss of privacy - what sort of information is stored about individuals, how it's used and when it becomes unethical; and the practical steps users can take to manage and minimize the risks of electronic crime and fraud. The book is not an alarmist vision of the digital age but an acknowledgment of the grave risks and dangers that are ever present in this environment. Peter Lilley analyses them all and uses examples to illustrate each threat. Crucially, he also provides practical preventive strategies for dealing with the risks, which every business should adopt. Lilley provides an eye-opening account of the various risks posed by the digital age, and what can be done to secure both individual and corporate information and privacy.Risks such as: organized digital crime; cyber laundering; fraudulent Internet Web sites; hacking and cracking; viruses; Web site defacement; unauthorized disclosure of confidential information; the fraudulent aspects of electronic cash; identity theft; hardcore and child pornography; information warfare; denial of service attacks where systems are inaccessible to legitimate users; invasion of digital privacy; and government digital monitoring such as Echelon

Contents

Preface - wired for crime. Part 1 Terminal velocitytechnology; A window on operating systems; A short timeline of viruses; A history of hacks; Doubtful definitions - from computer crime to the Digital Age; Scales and justice; Who are they and what are they to you? Part 2 System error: Hacked and cracked; Self-made disasters (and a few own goals); The threat inside; Dispensing cash; Digital laundering; My electronic wallet; Virus attacks. Part 3 Wide open to abuse.com: The medium is the message; The wheels of fortune; Images of innocence; Identity theft. Part 4 Information warfare: Origins and definitions; Old wine in new bottles; A war fought by terrorists; A useful business tool? Part 5 Privacy lost: We've got a line on you; Cookies, Carnivore and Echelon; Possible Echelon keywords; Spam, glorious spam; Abuse by e-mail. Part 6 Gimme shelter: How to create a secure organization -- checklists of issues; Educating your users - and that includes you. Appendices: Glossary of terms; Web directory; International laws and treaties; Domain extensions.