CONTENTS
Chapter 1: Technology Is a Double-Edged Sword
From the printing press to the information age
Chapter 2: Cyber Attack: It’s A Dangerous World for Information Systems
CyberEspionage (and Information Exfiltration) – It’s midnight; do you know where your data is?
Social Media – an opportunity and a challenge
The asymmetric effects of cyber attacks
Porous perimeters, compromisable software – or both?
If we know about the vulnerabilities, why are exploits still successful?
Get CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.