Cyber vandalism and identity theft represent enormous threats in a computer-driven world. This timely work focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our society. The nature and motives behind cyber attacks are investigated, as well as how they are committed and what efforts are being undertaken to prevent further acts from occurring.
This edition explores security issues also in the world of social networks. General security protocols and best practices have been updated to reflect changes in the cyber world, and the changing business information security landscape is analysed in detail.
Table of Contents
Acknowledgments
Preface
1. The Changing Landscape of Cybercrime
2. Morality
3. Ethics
4. Morality, Technology and Value
5. Cyberspace Infrastructure
6. Anatomy of the Problem
7. Enterprise Security
8. Information Security Protocols and Best Practices
9. Security and Privacy in Online Social Networks
10. Security in Mobile Systems
11. Security in the Cloud
12. Security and Compliance
Appendix: Questions for Classroom Use
Chapter Notes
Bibliography
Index