You are here

Cyberspace, Cybersecurity, and Cybercrime
Share

Cyberspace, Cybersecurity, and Cybercrime

Companion Website


September 2017 | 296 pages | SAGE Publications, Inc

Presented from a criminal justice perspective, Cyberspace, Cybersecurity, and Cybercrime introduces students to the interdisciplinary field of cybercrime by exploring the theoretical, practical, and legal framework it operates under, along with strategies to combat it. Authors Janine Kremling and Amanda M. Sharp Parker provide a straightforward overview of cybercrime, cyberthreats, and the vulnerabilities individuals, businesses, and governments face everyday in a digital environment. Highlighting the latest empirical research findings and challenges that cybercrime and cybersecurity pose for those working in the field of criminal justice, this book exposes critical issues related to privacy, terrorism, hacktivism, the dark web, and much more. Focusing on the past, present, and future impact of cybercrime and cybersecurity, it details how criminal justice professionals can be prepared to confront the changing nature of cybercrime.

 

Instructors! Sign in at study.sagepub.com/kremling for PowerPoint slides, test banks, and more!


 
 
Preface
 
Acknowledgments
 
Chapter 1 • Cyberspace, the Internet, and the World Wide Web
The Beginning of the Internet and Cyberspace  
The Purpose of the Internet  
Vulnerabilities of the Internet  
What Distinguishes Cyberspace, the Internet, and the World Wide Web?  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 2 • What Is Cybersecurity?
Origins and Nature of Cybersecurity  
Definitions  
Definition of Cybersecurity  
Cybersecurity Policies  
Overview of Cyberspace Intrusions  
Securing Your Wi-Fi in a Wireless World  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
Appendix 2A  
 
Chapter 3 • Threat Factors—Computers as Targets
The Evolution of Cybercrime  
Computers as a Target  
Viruses, Worms, and Trojan Horses  
Preventing Malware Intrusions  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime
Cybercrimes  
Fraud and Financial Crimes  
Cyberbullying  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 5 • Threats to Cybersecurity by Hacktivists and Nation-States
Threats to Cybersecurity  
What Motivates Hackers?  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 6 • National Security: Cyberwarfare and Cyberespionage
Cyberwarfare  
Nation-State Threats by Region  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 7 • Cyberterrorism
Cyberterrorism Defined  
The Role of the Media  
Evolution of the Threat  
Technology Use by Extremists  
Targets of Cyberterrorism  
Risk Management  
Damage Potential  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 8 • An Evolving Threat: The Deep Web
The Surface Web  
The Deep Web and Darknets  
Accessibility  
Products Available  
Payment: Cryptocurrency  
Law Enforcement Response  
Operation Onymous  
Anonymous and “Vigilante Justice”  
Terrorist Presence on the Deep and Dark Web  
Legal Issues  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Court Cases  
 
Chapter 9 • Cybersecurity Operations
Theoretical Operations  
Learning Theory  
Differential Association Theory  
Subculture Theory  
DEF CON Convention  
Law Enforcement Operations  
Target Hardening  
Honeypots, Nets, and Tokens  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 10 • Cybersecurity Policies and Legal Issues
National Cybersecurity Policies  
International Cybersecurity Policies  
Legal Issues  
Issues With Enforcement/Jurisdiction  
Summary  
Key Term  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 11 • What the Future Holds
Data Is the New Oil  
Emerging Threats  
Vulnerable Targets  
Potential/Emerging Perpetrators  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Appendix: Cybersecurity-Related Organizations
 
Glossary
 
Notes
 
Index
 
About the Authors

Supplements

Instructor Resource Site

Password-protected Instructor Resources include the following:

  • A Microsoft® Word® test bank is available containing multiple choice, true/false, short answer and essay questions for each chapter. The test bank provides you with a diverse range of pre-written options as well as the opportunity for editing any question and/or inserting your own personalized questions to effectively assess students’ progress and understanding.
  • Editable, chapter-specific Microsoft® PowerPoint® slides offer you complete flexibility in easily creating a multimedia presentation for your course. Highlight essential content, features, and artwork from the book.
Student Study Site

The open-access Student Study Site includes the following:

  • Mobile-friendly eFlashcards reinforce understanding of key terms and concepts that have been outlined in the chapters.
  • Mobile-friendly web quizzes allow for independent assessment of progress made in learning course material.
Key features
KEY FEATURES:
  • Compelling case studies engage students with real-world examples of important concepts to increase comprehension and critical thinking skills.
  • Legal Issue boxes encourage exploration of the legal implications surrounding issues in cybersecurity and cybercrime, such as privacy and espionage.
  • Think About It critical-thinking exercises present scenarios that challenge students to apply the concepts they have learned and to consider what they would do in each situation.
  • Learning objectives, internet resources, discussion questions, and key term definitions support student learning by clearly identifying the goals of each chapter, testing student comprehension of the material, and providing opportunities for further learning. 

For instructors

Please select a format:

Purchasing options

Please select a format:

ISBN: 9781506347257