Get full access to CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition and 60K+ other titles, with free 10-day trial of O'Reilly.
There's also live online events, interactive content, certification prep materials, and more.
Chapter 1: Technology Is a Double-Edged Sword
From the printing press to the information age
The ‘dark side of high tech’
Chapter 2: Cyber Attack: It’s A Dangerous World for Information Systems
CyberEspionage (and Information Exfiltration) – It’s midnight; do you know where your data is?
Social Media – an opportunity and a challenge
Supply Chain (In-) security
The blended threat
The asymmetric effects of cyber attacks
Porous perimeters, compromisable software – or both?
If we know about the vulnerabilities, why are exploits still successful?
Chapter 3: The Human Factor: The Underrated Threat
Are people the problem?
Who are the attackers?
Most likely forms of attack
Sometimes it’s just human ...
Get CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.
Get Mark Richards’s Software Architecture Patterns ebook to better understand how to design components—and how they should interact.