United States of America Us

Medias

  • La cybersécurité en question

    Le «cyberespace» est aujourd’hui un continent à conquérir, et à exploiter. Instrument de renseignement, il est aussi le théâtre d’une lutte de pouvoir secrète entre les nations. Entretien avec Solange Ghernaouti, experte en cybersécurité.

    3 october 2013

  • Communiqué de presse

    16 april 2013

    translation missing: en.content_file.content_types.binary/octet-stream.title (1,2 Mo)

About

Today, cyberspace is where new forms of criminality are being exploited; and cyberspace has become the economic and military battlefield where conflicts of all kinds are played out. the ability to control information and telecommunication infrastructure, to respond to cyberattacks and to ensure cybersecurity offers real power and has become one of the most significant political, economic and technological issues of this twenty-first century. Information and communication technologies (ICT) have grown to become a critical part of our society’s infrastructure, and their potential misuse affects us all, from the individual citizen to private and public organizations and states. thus cyberpower has become the newest means for organisations – both legitimate and criminal – to demonstrate their capabilities. This book explains the stakes of cyberpower in terms of its various manifestations, including cybercriminality, cyberterrorism, cyberconflicts and cyberwarfare. It evaluates the impacts on, and consequences for, individuals, organisations and states. it provides a panorama of the actors and their means of operating and describes the strategies, methodologies and kinds of measures that can be employed to combat the abusive and criminal uses of digital technologies, and thus improve security within cyberspace and in real life. The book’s educational approach, including numerous illustrations, exercises and case studies, makes a complex subject accessible to a wide public.

Content

  • Preface and Acknowledgement
  • Foreword
  • 1 Cybercrime and Cybersecurity Issues: Stakes and Challenges for the 21st Century – Understanding the context – The risks and the needs – Supporting and developing the digital society – Cybersecurity expectations – Summary – Exercises
  • 2 Cyberspace and Internet: a New Paradigm for Crime and Conflicts – Understanding the context – The characteristics of cybercrimes – The Internet: empowering criminals – Summary in 10 tips – Exercises
  • 3 Cybercrimes Against Persons – Understanding the context – Affecting people’s dignity and integrity – Swindles and frauds over the Internet – Identity crimes – Privacy related offences – Technological innovation and responsibility – Summary – Exercices
  • Cybercrimes Against Assets – Understanding the context – The typology of the main crimes against assets – Frauds and scams – Summary of offences from a technological perspective – Case study from the FBI – Exercises
  • 5 Cybercrimes Against States – Understanding the context – Examples of cybercriminal activities that can affect states – Cyberthreats against states – Summary – Exercises
  • 6 Cyberconflicts, Cyberwars and Cyberpower – Understanding the context – From cybercrime to cyberwar – Cyberwar – Information war – Cyberterrorism: a particular kind of cyberconflict – Cybercrime or cyber conflict? – Summary – Exercises
  • 7 Understanding Cybercriminals – Understanding the context – Towards a classification of cybercriminals – About hacking and hackers – Hackers’ conventions, contests, and school – Portraits of hackers – Summary – Exercices
  • 8 The Cybercriminal’s Toolkits – Understanding the context – Fundamental principles and constant factors of cyberattacks – Spam and phishing: assets for criminals – Means of obtaining connection parameters to access systems – Some basic attacks – The black market of cybercriminality – Summary – Exercises
  • 9 The Fight Against Cybercrime – Understanding the context – Strengthening legislation is not enough – An integrative approach and a global strategy – The principal challenges in combating cybercrime at the international level – Some privacy related considerations – Summary – Exercises
  • 10 The Global Cybercrime Ecosystem and Cybercriminal Investigation – Understanding the context – The place of the struggle against cybercriminality in the cybercriminal ecosystem – Cybercriminal investigation – The idea of digital evidence – Fundamental concepts in computer crime investigation – Investigating computer crimes within organizations – Summary – Exercises
  • 11 A Global Approach to Cybersecurity – Understanding the context – The evolution of information security – Avoiding the cybersecurity gap – A systemic approach to cybersecurity – Summary – Exercises
  • 12 Cybersecurity Governance and Security Measures – Understanding the context – Managing the risks – Defining a security policy – Understanding ICT security from a technical point of view – A functional approach to generic security tools – Cyber security as a competitive advantage – Summary – Exercises
  • 13 Cyberconflict & Cybercrime: Prospects for a Global Response – Understanding the context – Some complex and global questions – For an international treaty: a contribution to stability in cyberspace – Connecting the world responsibly – Summary – Exercises
  • Glossary of main cybercrime and cybersecurity related terms
  • Annex: Some references
  • Index

Details

Publisher: EPFL Press English Imprint

Author(s): Solange Ghernaouti

Collection: Forensic Sciences

Published: 26 march 2013

Edition: 1st edition

Media: Book

Pages count Book: 472

Format (in mm) Book: 160 x 240

Weight (in grammes): 980

Language(s): English

EAN13 Book: 9782940222667

From the same author
In the same collection
People also bought
Related topics
--:-- / --:--