Hackers and Hacking: A Reference Handbook

Hackers and Hacking: A Reference Handbook

Hackers and Hacking: A Reference Handbook

Hackers and Hacking: A Reference Handbook

Hardcover

$65.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.

What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.

Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud—acts that can have devastating effects upon our modern information society.


Product Details

ISBN-13: 9781610692762
Publisher: Bloomsbury Academic
Publication date: 07/19/2013
Series: Contemporary World Issues
Pages: 354
Product dimensions: 9.10(w) x 6.30(h) x 1.30(d)

About the Author

Thomas J. Holt, PhD, is associate professor in the School of Criminal Justice at Michigan State University. His published work includes Crime On-Line: Correlates, Causes, and Context and Digital Crime and Digital Terrorism, Second Edition.

Bernadette H. Schell, PhD, is vice-provost at Laurentian University in Barrie, Ontario, Canada. She was formerly Founding Dean of Business and Information Technology at the University of Ontario Institute of Technology. Her published work includes The Hacking of America: Who's Doing It, Why, and How and Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications.

Table of Contents

List of Figures and Tables xv

Preface xvii

1 Background and History 3

The Growth and Adoption of the Internet from 1969 through the Present 3

Internet Defined 3

Gaining Authorized Access to the Internet and the Modes of Communication 7

Email 7

Listserv 8

Internet Relay Chat 8

Telnet 8

Social Networking Websites 9

Remote Retrieval 10

A Closer Look at the Adoption of the Internet in Developed Nations 12

A Closer Look at the Adoption of the Internet in Developing Nations 13

Assessing the Present-Day Internet Economy on a Global Scale 15

Getting Unauthorized Network Access by Black Hat Hacking or Cracking 17

Hacker and Cracker Defined 17

Classifying Hackers by Intentions 18

Classifying Hackers by Skill 21

Classifying Hackers as Insiders or Outsiders 23

A Cautionary Note on Hacker Classification Schemes and Overgeneralizing about Hackers 24

Various Types of Hacker Exploits Causing Harm and the Harm Inflicted 26

Hacking Exploits in the Use of Deception and Theft of Property or Data 28

Hacking Exploits Used in Cyberviolence 31

The Key Elements of Criminal Liability, Conventional Crimes, and Hacking 37

Conventional Crimes and the Four Key Elements of Criminal Liability 37

Hacking and the Four Key Elements of Criminal Liability 37

Hacker Predispositions: What the Literature Tells Us 38

Hackers: Known Traits of Insiders 38

Hackers: Known Traits of Outsider/External Attackers 39

Conclusion 43

References 44

2 Problems, Controversies, and Solutions 53

Fundamentals of Hack Attacks and Patches as a Countermeasure 54

The Basics of Hack Attacks 54

Patches: An Organizational Countermeasure for Hack Attacks 56

The Evolving Structure of the Internet: The Good News and the Bad 58

The Good News: A New and Exciting Information Era 58

The Bad News: The Evolution of the Internet Creates a New Playing Field for Network Attackers 60

A Further Look at the Purpose and Function of Firewalls 61

The Pros and Cons of Moving to "the Cloud," 62

Network Hacks: Recent Surveys on the Frequency and the Types of Harm Caused 64

15th Annual Computer Crime and Security Survey (2010/2011) 67

Respondent Sample 69

Key Study Findings 70

Concluding Remarks 71

2011 TELUS-Rotman Joint Study on Canadian IT Security Practices 71

Respondent Sample 72

Key Study Findings 73

Laws Created to Keep Abreast of the Evolving Internet 76

Health Insurance Portability and Accountability Act of 1996 78

U.S. State Data Breach Notification Law 79

Sarbanes-Oxley Act 81

Payment Card Industry Data Security Standard 82

Intellectual Property Rights and Copyright Infringement 82

International Privacy and Security Laws 84

Privacy Laws 84

Security Laws in the United States 85

Security Laws in Other Jurisdictions 87

Federal Information Security Management Act 88

Gramm-Leach-Bliley Act 90

Health Information Technology for Economic and Clinical Health Act 92

Payment Card Industry Payment Application Standard 92

The Militarization of Cyberspace 94

Industry "Best Practices" for Preventing Hack Attacks and Recovering from Them 96

Protection Strategies 96

For Hacktivism 96

For Malware 98

For Drive-by Downloads and Blackholes 99

For Software Vulnerabilities 100

For USB Drives and Other Mobile Devices Such as Tablets 101

For Cloud "Insecurity," 102

For Social Networks 103

The Need for Security Policies and Security Policy Checklists in Businesses and Government Agencies 105

The Importance of Intrusion Prevention, Intrusion Detection, and Intrusion Recovery 107

Intrusion Prevention Is Important 107

Intrusion Detection Is Important 108

Intrusion Recovery Is Important 109

How Well Enterprises Are Coping with Network Prevention, Intrusions, and Recovery 110

Crystal Ball Gazing: What Might the Future Bring? 112

Conclusion 114

References 115

3 Perspectives 121

Protecting Critical Infrastructures Bob Radvanosky 121

Examining Social Dynamics and Malware Secrets to Mitigate Net-centric Attacks Ziming Zhao G.-J. Ahn 128

The Role of Nation-States in Cyberartacks Max Kilger 135

The Case for Strong Data Breach Notification Legislation Douglas E. Salane 141

Data Breach Notification Legislation 141

The Need for Strong, Broad-Based Consumer Protections 142

Data Breach Costs 144

Why Attempts at Federal Legislation Fall Short 145

Concluding Remarks 147

A Criminologist's Perspective on the Implications of Criminological Research for Policies and Practices Aimed at Addressing Hacking and Malware Infection Adam M. Bossier 149

Implications for Parental and School Practices 149

Policy Implications for Law Enforcement 152

Hacking and Criminality Nathan Fisk 154

The Life Cycle of a Botnet Aditya K. Sood Richard J. Enbody 159

Taking the Fun out of Playtime: Real Crime and Video Games Rob D'Ovidio Murugan Anandarajan Alex Jenkins 164

Looking at Crime in Video Games through the Lens of Routine Activities Theory 165

4 Profiles 173

5 Data and Documents 239

Anti-Phishing Working Group: Phishing Activity Trends Report, Second Quarter 2012 240

The Malware Domain List 243

Ponemon Institute Study: 2011 Cost of Data Breach Study: United States 248

Symantec: Internet Security Threat Report 2011 253

A Closer Look at Corporate and Governmental Data Theft on a Global Basis: The 2012 Verizon Data Breach Investigations Report 260

The On-Land and Online Real-World Context 260

The Report's Main Findings 263

Report Conclusions 266

References 267

6 Resources 271

Print: Books 272

Print: Magazines, White Papers, News, and Downloadable Articles 293

Nonprint: Hacking Websites 299

Nonprint: Hacking-Related Films and Learn How-to-Hack Videos 300

Nonprint: Websites of Companies Offering Antivirus Software 302

Nonprint: Websites of Companies Offering Firewalls 305

Nonprint: Websites of Companies Offering Intrusion-Detection Systems 307

Nonprint: U.S. Government Agencies and Independent Organizations Fighting Malicious Hacking 308

7 Chronology 315

Prehistory (1800s-1969) 315

1815 to Mid-1800s 315

1920s-1950s 316

The Elder Days (1970-1979) 317

The Golden Age (1980-1989) 319

The Great Hacker Wars and Hacker Activism (1990-2000) 322

Fear of a Cyber-Apocalypse Era (2001-Present) 325

Glossary 329

About the Authors 343

Index 345

From the B&N Reads Blog

Customer Reviews