Benign to Scary

Computers and networks touch every facet of modern life. We are increasingly dependent on computer/network technology for communication, funds transfers, utility management, government services, military action, and maintaining confidential information. We use technology to provide energy, water supplies, emergency services, defense systems, electronic banking, and public health services. At the same time, this technology is being abused to perform illegal or malicious activities, such as to steal credit card numbers, use telephone systems fraudulently, illegally transmit trade secrets and intellectual property, deface web sites for political reasons, disrupt communications, reveal critical national secrets and strategies, and ...

Get CISSP Certification All-in-One Exam Guide, Fourth Edition, 4th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.