Information Security News mailing list archives

REVIEW: "Cybercrime: Vandalizing the Information Society", Steven Furnell


From: InfoSec News <isn () c4i org>
Date: Mon, 10 Feb 2003 02:31:26 -0600 (CST)

Forwarded from: "Rob, grandpa of Ryan, Trevor, Devon & Hannah" <rslade () sprint ca>

BKCYBCRM.RVW   20030121

"Cybercrime: Vandalizing the Information Society", Steven Furnell,
2002, 0-201-72159-7, U$29.99/C$44.95
%A   Steven Furnell
%C   P.O. Box 520, 26 Prince Andrew Place, Don Mills, Ontario  M3C 2T8
%D   2002
%G   0-201-72159-7
%I   Addison-Wesley Publishing Co.
%O   U$29.99/C$44.95 416-447-5101 fax: 416-443-0948 bkexpress () aw com
%O  http://www.amazon.com/exec/obidos/ASIN/0201721597/robsladesinterne
%P   316 p.
%T   "Cybercrime: Vandalizing the Information Society"

The preface states that this book is a general introduction to
cybercrime, directed at any audience, and requiring no specific
technical background.  With certain provisos, those objectives are
met.

Chapter one is a historical look at information and the rise of the
net, dealing particularly with basic concepts and security.  Computer
related crime is said to be happening, in chapter two, and some
anecdotal examples are given.  Blackhat "celebrities" and groups are
examined in chapter three.  While the jargon that Furnell uses tends
to come from the media, his research is obviously superior to that of
many similar books on the topic.  Chapter four lists some exploits and
attack approaches.  Malware, in chapter five, also shows better than
normal investigation, although some of the terminology is dated. 
Societal aspects of cybercrime, in chapter six, seems to rely
primarily on opinion surveys, but there is some interesting material
on laws and the public perception of cybercriminals.  Recent
developments, such as ethical hacking, hacktivism, information
warfare, and cyberterrorism, are collected in chapter seven.  Chapter
eight lists some recommended security practices.

The book does fall into the all-too-usual trap of concentrating on the
sensational side of information and network related crime (that of the
outside, and targeted, intruder), and therefore fails to provide a
complete picture.  However, within its limits, the work does present a
reasonable and balanced view.

copyright, Robert M. Slade, 2003   BKCYBCRM.RVW   20030121

-- 
======================
rslade () vcn bc ca  rslade () sprint ca  slade () victoria tc ca p1 () canada com
Find book info victoria.tc.ca/techrev/ or sun.soci.niu.edu/~rslade/
Upcoming (ISC)^2 CISSP CBK review seminars (+1-888-333-4458):
          March 31, 2003           Indianapolis, IN




-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn'
in the BODY of the mail.


Current thread: