You are not signed in. Sign in.

List Books: Buy books on ListBooks.org

Fighting Computer Crime: A New Framework for Protecting Information »

Book cover image of Fighting Computer Crime: A New Framework for Protecting Information by Donn B. Parker

Authors: Donn B. Parker, Barbara Steve Parker
ISBN-13: 9780471163787, ISBN-10: 0471163783
Format: Paperback
Publisher: Wiley, John & Sons, Incorporated
Date Published: August 1998
Edition: (Non-applicable)

Find Best Prices for This Book »

Author Biography: Donn B. Parker

DONN B. PARKER has written numerous books and articles on computer crime. The world's most listened-to cybercrime expert, he has been featured in articles appearing in newspapers and magazines ranging from PC Magazine to People and has appeared on 60 Minutes, 20/20, and Nova.

Book Synopsis

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuable technical insight about the means cybercriminals employ, as well as penetrating psychological insights into their criminal behavior and motivations. Using many riveting real-life crime stories to illustrate his points, he reveals:

* Who your greatest security threats really are (be prepared for some surprises!)

* Why employees undergoing divorce can be your organization's greatest computer security risk

* How to overcome cyberterrorists who will employ any high-tech or low-tech means necessary to crash your systems.

* Effective countermeasures for each threat covered in the book

* How to neutralize even the most powerful cybercrime scheme attempts

* Why and how the incorrect, incomplete, inarticulate security folk art must be revitalized

Booknews

A 30-year veteran cybercrime stopper explains that current computer security methods are falling dangerously short of their mark because they are put together by experts in operational and technical controls who do not understand the ingenuity and perseverance of criminals. He has answers. No bibliography. Annotation c. by Book News, Inc., Portland, Or.

Table of Contents

Foreword
Preface
Ch. 1The Myth of Information Security1
Ch. 2What Are We Protecting?27
Ch. 3The Rise of Cybercrime57
Ch. 4Computer Abuse and Misuse81
Ch. 5Network Abuse and Misuse113
Ch. 6Cyberspace Abusers and Misusers135
Ch. 7The Disastrous Hacker Culture157
Ch. 8The Artisans of Information Security189
Ch. 9The Current Foundation for Information Security211
Ch. 10A New Framework for Information Security229
Ch. 11Information Security Assessments261
Ch. 12How to Conduct a Baseline Security Assessment295
Ch. 13Good and Bad Control Objectives325
Ch. 14Tactics for Effective Information Security361
Ch. 15Strategies for Effective Information Security411
Ch. 16Organizing for Security437
Ch. 17Doing It Right and Preparing for the Next Millennium475
Index501

Subjects