You are here

Cyberspace, Cybersecurity, and Cybercrime
Share

Cyberspace, Cybersecurity, and Cybercrime



© 2018 | 296 pages | SAGE Publications, Inc

Presented from a criminal justice perspective, Cyberspace, Cybersecurity, and Cybercrime introduces students to the interdisciplinary field of cybercrime by exploring the theoretical, practical, and legal framework it operates under, along with strategies to combat it. Authors Janine Kremling and Amanda M. Sharp Parker provide a straightforward overview of cybercrime, cyberthreats, and the vulnerabilities individuals, businesses, and governments face everyday in a digital environment. Highlighting the latest empirical research findings and challenges that cybercrime and cybersecurity pose for those working in the field of criminal justice, this book exposes critical issues related to privacy, terrorism, hacktivism, the dark web, and much more. Focusing on the past, present, and future impact of cybercrime and cybersecurity, it details how criminal justice professionals can be prepared to confront the changing nature of cybercrime.

 

Instructors! Sign in at study.sagepub.com/kremling for PowerPoint slides, test banks, and more!


 
 
Preface
 
Acknowledgments
 
Chapter 1 • Cyberspace, the Internet, and the World Wide Web
The Beginning of the Internet and Cyberspace  
The Purpose of the Internet  
Vulnerabilities of the Internet  
What Distinguishes Cyberspace, the Internet, and the World Wide Web?  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 2 • What Is Cybersecurity?
Origins and Nature of Cybersecurity  
Definitions  
Definition of Cybersecurity  
Cybersecurity Policies  
Overview of Cyberspace Intrusions  
Securing Your Wi-Fi in a Wireless World  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
Appendix 2A  
 
Chapter 3 • Threat Factors—Computers as Targets
The Evolution of Cybercrime  
Computers as a Target  
Viruses, Worms, and Trojan Horses  
Preventing Malware Intrusions  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 4 • Threats to Cybersecurity by Criminals and Organized Crime
Cybercrimes  
Fraud and Financial Crimes  
Cyberbullying  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 5 • Threats to Cybersecurity by Hacktivists and Nation-States
Threats to Cybersecurity  
What Motivates Hackers?  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 6 • National Security: Cyberwarfare and Cyberespionage
Cyberwarfare  
Nation-State Threats by Region  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 7 • Cyberterrorism
Cyberterrorism Defined  
The Role of the Media  
Evolution of the Threat  
Technology Use by Extremists  
Targets of Cyberterrorism  
Risk Management  
Damage Potential  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 8 • An Evolving Threat: The Deep Web
The Surface Web  
The Deep Web and Darknets  
Accessibility  
Products Available  
Payment: Cryptocurrency  
Law Enforcement Response  
Operation Onymous  
Anonymous and “Vigilante Justice”  
Terrorist Presence on the Deep and Dark Web  
Legal Issues  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Court Cases  
 
Chapter 9 • Cybersecurity Operations
Theoretical Operations  
Learning Theory  
Differential Association Theory  
Subculture Theory  
DEF CON Convention  
Law Enforcement Operations  
Target Hardening  
Honeypots, Nets, and Tokens  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 10 • Cybersecurity Policies and Legal Issues
National Cybersecurity Policies  
International Cybersecurity Policies  
Legal Issues  
Issues With Enforcement/Jurisdiction  
Summary  
Key Term  
Discussion Questions  
Internet Resources  
Further Reading  
 
Chapter 11 • What the Future Holds
Data Is the New Oil  
Emerging Threats  
Vulnerable Targets  
Potential/Emerging Perpetrators  
Summary  
Key Terms  
Discussion Questions  
Internet Resources  
Further Reading  
 
Appendix: Cybersecurity-Related Organizations
 
Glossary
 
Notes
 
Index
 
About the Authors

Supplements

Instructor Resource Site

Password-protected Instructor Resources include the following:

  • A Microsoft® Word® test bank is available containing multiple choice, true/false, short answer and essay questions for each chapter. The test bank provides you with a diverse range of pre-written options as well as the opportunity for editing any question and/or inserting your own personalized questions to effectively assess students’ progress and understanding.
  • Editable, chapter-specific Microsoft® PowerPoint® slides offer you complete flexibility in easily creating a multimedia presentation for your course. Highlight essential content, features, and artwork from the book.
Student Study Site

The open-access Student Study Site includes the following:

  • Mobile-friendly eFlashcards reinforce understanding of key terms and concepts that have been outlined in the chapters.
  • Mobile-friendly web quizzes allow for independent assessment of progress made in learning course material.

Janine Kremling

Janine Kremling is an Associate Professor in the Criminal Justice Department at California State University San Bernardino, California. She received her Ph.D. from the University of South Florida. Dr. Kremling has been studying cybercrime since 2014 and is currently focusing on the organizational aspects of cybercrime, also referred to as Crime Inc. She resides in Fontana, California.   More About Author

Amanda M. Sharp Parker

Amanda Parker is an Assistant Professor of Homeland Security and Coordinator of the Homeland Security program at Campbell University in Buies Creek, North Carolina. She obtained her Ph.D. in Criminology from the University of South Florida. Dr. Parker has been studying cyberthreats and transnational terrorism threats since 2005. She has presented nationally and internationally (England, Spain, Poland, Northern Ireland, and Wales) on many aspects of cybercrime and cybersecurity, including cyberterrorism. She resides in Dunn, North Carolina with her daughter Tatiana (8) and her son Jax (6).  More About Author

Purchasing options

Please select a format:

ISBN: 9781506347257
$59.00