Cover image for Cyber power : Crime, conflict and security in cyberspace.
Title:
Cyber power : Crime, conflict and security in cyberspace.
Author:
Ghernaouti-Hélie, Solange, 1958-....
ISBN:
9781466573048
Publication Information:
Boca raton : Crc press, 2013.
Contents:
Machine generated contents note: ch. 1 Cybercrime and Cybersecurity Issues: Stakes and Challenges for the 21st Century -- 1.1.Understanding the context -- 1.2.The risks and the needs -- 1.3.Supporting and developing the digital society -- 1.4.Cybersecurity expectations -- 1.5.Summary -- 1.6.Exercises -- ch. 2 Cyberspace and Internet: a New Paradigm for Crime and Conflicts -- 2.1.Understanding the context -- 2.2.The characteristics of cybercrimes -- 2.3.The Internet: empowering criminals -- 2.4.Summary in 10 tips -- 2.5.Exercises -- ch. 3 Cybercrimes Against Persons -- 3.1.Understanding the context -- 3.2.Affecting people's dignity and integrity -- 3.3.Swindles and frauds over the Internet -- 3.4.Identity crimes -- 3.5.Privacy related offences -- 3.6.Technological innovation and responsibility -- 3.7.Summary -- 3.8.Exercices -- ch. 4 Cybercrimes Against Assets -- 4.1.Understanding the context -- 4.2.The typology of the main crimes against assets -- 4.3.Frauds and scams --

Contents note continued: 4.4.Summary of offences from a technological perspective -- 4.5.Case study from the FBI -- 4.6.Exercises -- ch. 5 Cybercrimes Against States -- 5.1.Understanding the context -- 5.2.Examples of cybercriminal activities that can affect states -- 5.3.Cyberthreats against states -- 5.4.Summary -- 5.5.Exercises -- ch. 6 Cyberconflicts, Cyberwars and Cyberpower -- 6.1.Understanding the context -- 6.2.From cybercrime to cyberwar -- 6.3.Cyberwar -- 6.4.Information war -- 6.5.Cyberterrorism: a particular kind of cyberconflict -- 6.6.Cybercrime or cyber conflict? -- 6.7.Summary -- 6.8.Exercises -- ch. 7 Understanding Cybercriminals -- 7.1.Understanding the context -- 7.2.Towards a classification of cybercriminals -- 7.3.About hacking and hackers -- 7.4.Hackers' conventions, contests, and school -- 7.5.Portraits of hackers -- 7.6.Summary -- 7.7.Exercices -- ch. 8 The Cybercriminal's Toolkits -- 8.1.Understanding the context --

Contents note continued: 8.2.Fundamental principles and constant factors of cyberattacks -- 8.3.Spam and phishing: assets for criminals -- 8.4.Means of obtaining connection parameters to access systems -- 8.5.Some basic attacks -- 8.6.The black market of cybercriminality -- 8.7.Summary -- 8.8.Exercises -- ch. 9 The Fight Against Cybercrime -- 9.1.Understanding the context -- 9.2.Strengthening legislation is not enough -- 9.3.An integrative approach and a global strategy -- 9.4.The principal challenges in combating cybercrime at the international level -- 9.5.Some privacy related considerations -- 9.6.Summary -- 9.7.Exercises -- ch. 10 The Global Cybercrime Ecosystem and Cybercriminal Investigation -- 10.1.Understanding the context -- 10.2.The place of the struggle against cybercriminality in the cybercriminal ecosystem -- 10.3.Cybercriminal investigation -- 10.4.The idea of digital evidence -- 10.5.Fundamental concepts in computer crime investigation --

Contents note continued: 10.6.Investigating computer crimes within organizations -- 10.7.Summary -- 10.8.Exercises -- ch. 11 A Global Approach to Cybersecurity -- 11.1.Understanding the context -- 11.2.The evolution of information security -- 11.3.Avoiding the cybersecurity gap -- 11.4.A systemic approach to cybersecurity -- 11.5.Summary -- 11.6.Exercises -- ch. 12 Cybersecurity Governance and Security Measures -- 12.1.Understanding the context -- 12.2.Managing the risks -- 12.3.Defining a security policy -- 12.4.Understanding ICT security from a technical point of view -- 12.5.A functional approach to generic security tools -- 12.6.Cyber security as a competitive advantage -- 12.7.Summary -- 12.8.Exercises -- ch. 13 Cyberconflict & Cybercrime: Prospects for a Global Response -- 13.1.Understanding the context -- 13.2.Some complex and global questions -- 13.3.For an international treaty: a contribution to stability in cyberspace -- 13.4.Connecting the world responsibly --

Contents note continued: 13.4.Summary -- 13.5.Exercises.
Copies: