Authors: Donn B. Parker, Barbara Steve Parker
ISBN-13: 9780471163787, ISBN-10: 0471163783
Format: Paperback
Publisher: Wiley, John & Sons, Incorporated
Date Published: August 1998
Edition: (Non-applicable)
DONN B. PARKER has written numerous books and articles on computer crime. The world's most listened-to cybercrime expert, he has been featured in articles appearing in newspapers and magazines ranging from PC Magazine to People and has appeared on 60 Minutes, 20/20, and Nova.
Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuable technical insight about the means cybercriminals employ, as well as penetrating psychological insights into their criminal behavior and motivations. Using many riveting real-life crime stories to illustrate his points, he reveals:
* Who your greatest security threats really are (be prepared for some surprises!)
* Why employees undergoing divorce can be your organization's greatest computer security risk
* How to overcome cyberterrorists who will employ any high-tech or low-tech means necessary to crash your systems.
* Effective countermeasures for each threat covered in the book
* How to neutralize even the most powerful cybercrime scheme attempts
* Why and how the incorrect, incomplete, inarticulate security folk art must be revitalized
A 30-year veteran cybercrime stopper explains that current computer security methods are falling dangerously short of their mark because they are put together by experts in operational and technical controls who do not understand the ingenuity and perseverance of criminals. He has answers. No bibliography. Annotation c. by Book News, Inc., Portland, Or.
Foreword | ||
Preface | ||
Ch. 1 | The Myth of Information Security | 1 |
Ch. 2 | What Are We Protecting? | 27 |
Ch. 3 | The Rise of Cybercrime | 57 |
Ch. 4 | Computer Abuse and Misuse | 81 |
Ch. 5 | Network Abuse and Misuse | 113 |
Ch. 6 | Cyberspace Abusers and Misusers | 135 |
Ch. 7 | The Disastrous Hacker Culture | 157 |
Ch. 8 | The Artisans of Information Security | 189 |
Ch. 9 | The Current Foundation for Information Security | 211 |
Ch. 10 | A New Framework for Information Security | 229 |
Ch. 11 | Information Security Assessments | 261 |
Ch. 12 | How to Conduct a Baseline Security Assessment | 295 |
Ch. 13 | Good and Bad Control Objectives | 325 |
Ch. 14 | Tactics for Effective Information Security | 361 |
Ch. 15 | Strategies for Effective Information Security | 411 |
Ch. 16 | Organizing for Security | 437 |
Ch. 17 | Doing It Right and Preparing for the Next Millennium | 475 |
Index | 501 |