You are here

Cyberspace, Cybersecurity, and Cybercrime
Share

Cyberspace, Cybersecurity, and Cybercrime

Additional resources:


December 2017 | 296 pages | SAGE Publications, Inc

Presented from a criminal justice perspective, Cyberspace, Cybersecurity, and Cybercrime introduces students to the interdisciplinary field of cybercrime by exploring the theoretical, practical, and legal framework it operates under, along with strategies to combat it. Authors Janine Kremling and Amanda M. Sharp Parker provide a straightforward overview of cybercrime, cyberthreats, and the vulnerabilities individuals, businesses, and governments face everyday in a digital environment. Highlighting the latest empirical research findings and challenges that cybercrime and cybersecurity pose for those working in the field of criminal justice, this book exposes critical issues related to privacy, terrorism, hacktivism, the dark web, and much more. Focusing on the past, present, and future impact of cybercrime and cybersecurity, it details how criminal justice professionals can be prepared to confront the changing nature of cybercrime.

 

Instructors! Sign in at study.sagepub.com/kremling for PowerPoint slides, test banks, and more!


 
 
Preface
 
Acknowledgments
 
Chapter 1 • Cyberspace, the Internet, and the World Wide Web
The Beginning of the Internet and Cyberspace

 
The Purpose of the Internet

 
Vulnerabilities of the Internet

 
What Distinguishes Cyberspace, the Internet, and the World Wide Web?

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 2 • What Is Cybersecurity?
Origins and Nature of Cybersecurity

 
Definitions

 
Definition of Cybersecurity

 
Cybersecurity Policies

 
Overview of Cyberspace Intrusions

 
Securing Your Wi-Fi in a Wireless World

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
Appendix 2A

 
 
Chapter 3 • Threat Factors—Computers as Targets
The Evolution of Cybercrime

 
Computers as a Target

 
Viruses, Worms, and Trojan Horses

 
Preventing Malware Intrusions

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime
Cybercrimes

 
Fraud and Financial Crimes

 
Cyberbullying

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 5 • Threats to Cybersecurity by Hacktivists and Nation-States
Threats to Cybersecurity

 
What Motivates Hackers?

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 6 • National Security: Cyberwarfare and Cyberespionage
Cyberwarfare

 
Nation-State Threats by Region

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 7 • Cyberterrorism
Cyberterrorism Defined

 
The Role of the Media

 
Evolution of the Threat

 
Technology Use by Extremists

 
Targets of Cyberterrorism

 
Risk Management

 
Damage Potential

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 8 • An Evolving Threat: The Deep Web
The Surface Web

 
The Deep Web and Darknets

 
Accessibility

 
Products Available

 
Payment: Cryptocurrency

 
Law Enforcement Response

 
Operation Onymous

 
Anonymous and “Vigilante Justice”

 
Terrorist Presence on the Deep and Dark Web

 
Legal Issues

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Court Cases

 
 
Chapter 9 • Cybersecurity Operations
Theoretical Operations

 
Learning Theory

 
Differential Association Theory

 
Subculture Theory

 
DEF CON Convention

 
Law Enforcement Operations

 
Target Hardening

 
Honeypots, Nets, and Tokens

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 10 • Cybersecurity Policies and Legal Issues
National Cybersecurity Policies

 
International Cybersecurity Policies

 
Legal Issues

 
Issues With Enforcement/Jurisdiction

 
Summary

 
Key Term

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Chapter 11 • What the Future Holds
Data Is the New Oil

 
Emerging Threats

 
Vulnerable Targets

 
Potential/Emerging Perpetrators

 
Summary

 
Key Terms

 
Discussion Questions

 
Internet Resources

 
Further Reading

 
 
Appendix: Cybersecurity-Related Organizations
 
Glossary
 
Notes
 
Index
 
About the Authors

Supplements

Instructor Resource Site

Password-protected Instructor Resources include the following:

  • A Microsoft® Word® test bank is available containing multiple choice, true/false, short answer and essay questions for each chapter. The test bank provides you with a diverse range of pre-written options as well as the opportunity for editing any question and/or inserting your own personalized questions to effectively assess students’ progress and understanding.
  • Editable, chapter-specific Microsoft® PowerPoint® slides offer you complete flexibility in easily creating a multimedia presentation for your course. Highlight essential content, features, and artwork from the book.
Student Study Site

The open-access Student Study Site includes the following:

  • Mobile-friendly eFlashcards reinforce understanding of key terms and concepts that have been outlined in the chapters.
  • Mobile-friendly web quizzes allow for independent assessment of progress made in learning course material.

For instructors

This book is not available as an inspection copy. For more information contact your local sales representative.

Select a Purchasing Option


Paperback
ISBN: 9781506347257
£46.99