The author of Crime by Computer (1976) - and, subsequently, "four
other major works" bearing on the subject - here provides a dossier
on computer abuses chiefly designed, it appears, to allay fears of
computerization by down-playing "computer crime" and downgrading
computer diddling. The book is so murky and choppy, however, that
few are likely to penetrate very far. To start with, we have an
epigraph from IBM: "The Computer didn't do it." Then Parker assures
us that "computer crime is relatively rare when compared with other
crime." "As computers proliferate," moreover, "I anticipate that
adequate security measures will be planned and implemented." (How
he and his employer do this, we later hear.) In the leadoff case, a
financial fraud perpetrated by a computer expert, "computers were
not essential to the crime. The news media called it a computer
crime because most reporters don't know the difference" (and they
know the public responds). Then, 13 technical computer-crime
methods are described (piggybacking, superzapping, wiretapping,
etc.), along with safeguards against them. Various types of
"computer criminals" are discussed, along with the need to reform
them. (Students must learn that "the computer is sacrosanct"; the
"common rationalization" that the use of idle services is harmless
must be exposed.) Other brief chapters take up the weaknesses of
existing laws, the problems of Electronic Funds Transfer security,
etc. Computer security itself is divided into five "layers," six
"functions," and assorted "safeguards." The book's real subject, in
fact, is computer security; for public concerns - from individual
privacy to national security - and for tales of computer crime,
readers will have to look elsewhere (including Burnham, above, and
Pool, below). (Kirkus Reviews)
Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuable technical insight about the means cybercriminals employ, as well as penetrating psychological insights into their criminal behavior and motivations. Using many riveting real-life crime stories to illustrate his points, he reveals:
* Who your greatest security threats really are (be prepared for some surprises!)
* Why employees undergoing divorce can be your organization's greatest computer security risk
* How to overcome cyberterrorists who will employ any high-tech or low-tech means necessary to crash your systems.
* Effective countermeasures for each threat covered in the book
* How to neutralize even the most powerful cybercrime scheme attempts
* Why and how the incorrect, incomplete, inarticulate security folk art must be revitalized
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!