[ISN] REVIEW: "Cybercrime: Vandalizing the Information Society", Steven Furnell

From: InfoSec News (isnat_private)
Date: Mon Feb 10 2003 - 00:31:26 PST

  • Next message: InfoSec News: "[ISN] If tech companies were liable for security holes, cyberspace would become safer"

    Forwarded from: "Rob, grandpa of Ryan, Trevor, Devon & Hannah" <rsladeat_private>
    BKCYBCRM.RVW   20030121
    "Cybercrime: Vandalizing the Information Society", Steven Furnell,
    2002, 0-201-72159-7, U$29.99/C$44.95
    %A   Steven Furnell
    %C   P.O. Box 520, 26 Prince Andrew Place, Don Mills, Ontario  M3C 2T8
    %D   2002
    %G   0-201-72159-7
    %I   Addison-Wesley Publishing Co.
    %O   U$29.99/C$44.95 416-447-5101 fax: 416-443-0948 bkexpressat_private
    %O  http://www.amazon.com/exec/obidos/ASIN/0201721597/robsladesinterne
    %P   316 p.
    %T   "Cybercrime: Vandalizing the Information Society"
    The preface states that this book is a general introduction to
    cybercrime, directed at any audience, and requiring no specific
    technical background.  With certain provisos, those objectives are
    Chapter one is a historical look at information and the rise of the
    net, dealing particularly with basic concepts and security.  Computer
    related crime is said to be happening, in chapter two, and some
    anecdotal examples are given.  Blackhat "celebrities" and groups are
    examined in chapter three.  While the jargon that Furnell uses tends
    to come from the media, his research is obviously superior to that of
    many similar books on the topic.  Chapter four lists some exploits and
    attack approaches.  Malware, in chapter five, also shows better than
    normal investigation, although some of the terminology is dated. 
    Societal aspects of cybercrime, in chapter six, seems to rely
    primarily on opinion surveys, but there is some interesting material
    on laws and the public perception of cybercriminals.  Recent
    developments, such as ethical hacking, hacktivism, information
    warfare, and cyberterrorism, are collected in chapter seven.  Chapter
    eight lists some recommended security practices.
    The book does fall into the all-too-usual trap of concentrating on the
    sensational side of information and network related crime (that of the
    outside, and targeted, intruder), and therefore fails to provide a
    complete picture.  However, within its limits, the work does present a
    reasonable and balanced view.
    copyright, Robert M. Slade, 2003   BKCYBCRM.RVW   20030121
    rsladeat_private  rsladeat_private  sladeat_private p1at_private
    Find book info victoria.tc.ca/techrev/ or sun.soci.niu.edu/~rslade/
    Upcoming (ISC)^2 CISSP CBK review seminars (+1-888-333-4458):
              March 31, 2003           Indianapolis, IN
    ISN is currently hosted by Attrition.org
    To unsubscribe email majordomoat_private with 'unsubscribe isn'
    in the BODY of the mail.

    This archive was generated by hypermail 2b30 : Mon Feb 10 2003 - 03:35:05 PST