Skip to main content Site map

Cybercrime and Cyber Warfare (PDF eBook)


Cybercrime and Cyber Warfare (PDF eBook)

eBook by Bernik, Igor

Cybercrime and Cyber Warfare (PDF eBook)

£138.95

ISBN:
9781118898956
Publication Date:
19 Feb 2014
Publisher:
Wiley
Imprint:
Wiley-ISTE
Pages:
176 pages
Format:
eBook
For delivery:
Download available
Cybercrime and Cyber Warfare (PDF eBook)

Description

In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators, their motives and their organizations. Tools for implementing attacks are also briefly mentioned, however this book is not technical and does not intend to instruct readers about the technical aspects of cybercrime, but rather focuses on managerial views of cybercrime. Other sections of this chapter deal with the protection against attacks, fear, investigation and the cost of cybercrime. Relevant legislation and legal bodies, which are used in cybercrime, are briefly described at the end of the chapter. The second chapter deals with cyberwarfare and explains the difference between classic cybercrime and operations taking place in the modern inter-connected world. It tackles the following questions: who is committing cyberwarfare; who are the victims and who are the perpetrators? Countries which have an important role in cyberwarfare around the world, and the significant efforts being made to combat cyberwarfare on national and international levels, are mentioned. The common points of cybercrime and cyberwarfare, the methods used to protect against them and the vision of the future of cybercrime and cyberwarfare are briefly described at the end of the book. Contents 1. Cybercrime. 2. Cyberwarfare. About the Authors Igor Bernik is Vice Dean for Academic Affairs and Head of the Information Security Lab at the University of Maribor, Slovenia. He has written and contributed towards over 150 scientific articles and conference papers, and co-authored 4 books. His current research interests concern information/cybersecurity, cybercrime, cyberwarfare and cyberterrorism.

Contents

Introduction vii Acknowledgement x Chapter 1. Cybercrime 1 1.1 The perpetrators of cybercrime 22 1.1.1. Motives of the perpetrators of cybercrime 25 1.1.2. Types of offenders 26 1.1.3. Organization of perpetrators 28 1.2 Tools for implementing attacks 31 1.3 System protection against attacks 32 1.4 Fear of cybercrime 34 1.5 Investigation of cybercrime 37 1.6 Cost of cybercrime 39 1.6.1. Measuring the cost of cybercrime model 41 1.6.2. Cost framework for cybercrime model 45 1.7. The Council of Europe Convention on Cybercrime 49 1.7.1. The Council of Europe Convention on Cybercrime 49 1.7.2. Agreement on Trade-Related Aspects of Intellectual Property Rights 52 1.7.3. Digital Millennium Copyright Act 53 1.7.4. United Nations Charter 54 1.8. Cybercrime conclusion 55 Chapter 2 Cyberwarfare 57 2.1. Information and cyberspace 60 2.1.1. Cyberspace and ICT 60 2.1.2. Information power and information conflict 64 2.2. Understanding cyberwarfare 67 2.2.1. The nature of cyberwarfare 70 2.2.2. Types and techniques of cyberwarfare 72 2.3. Perpetrators and victims of cyberwarfare 80 2.4. Committing cyberwarfare 82 2.4.1. Espionage 82 2.4.2. Active warfare 85 2.4.3. Information operations 88 2.4.4. Propaganda activity 90 2.5. Organizations and cyberwarfare 95 2.5.1. Industrial espionage 98 2.5.2. Politically and ideologically motivated groups perpetrators of cyberwarfare 103 2.6. The role of countries in cyberwarfare 107 2.6.1. The United States 108 2.6.2. China 113 2.6.3. Russia 117 2.6.4 India 119 2.6.5. Iran 121 2.6.6. Israel 121 2.6.7. North Korea 122 2.7. Efforts against cyberwarfare: international and national legislation 123 2.8. Defense against cyberwarfare 133 2.9. Cyberwarfare conclusion 139 Conclusion 141 Bibliography 145 Index 163

Accessing your eBook through Kortext

Once purchased, you can view your eBook through the Kortext app, available to download for Windows, Android and iOS devices. Once you have downloaded the app, your eBook will be available on your Kortext digital bookshelf and can even be downloaded to view offline anytime, anywhere, helping you learn without limits.

In addition, you'll have access to Kortext's smart study tools including highlighting, notetaking, copy and paste, and easy reference export.

To download the Kortext app, head to your device's app store or visit https://app.kortext.com to sign up and read through your browser.

This is a Kortext title - click here to find out more This is a Kortext title - click here to find out more

NB: eBook is only available for a single-user licence (i.e. not for multiple / networked users).

Back

University of Sunderland logo