![Hackers and Hacking: A Reference Handbook](http://img.images-bn.com/static/redesign/srcs/images/grey-box.png?v11.8.5)
Hackers and Hacking: A Reference Handbook
354![Hackers and Hacking: A Reference Handbook](http://img.images-bn.com/static/redesign/srcs/images/grey-box.png?v11.8.5)
Hackers and Hacking: A Reference Handbook
354Hardcover
-
PICK UP IN STORECheck Availability at Nearby Stores
Available within 2 business hours
Related collections and offers
Overview
What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.
Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud—acts that can have devastating effects upon our modern information society.
Product Details
ISBN-13: | 9781610692762 |
---|---|
Publisher: | Bloomsbury Academic |
Publication date: | 07/19/2013 |
Series: | Contemporary World Issues |
Pages: | 354 |
Product dimensions: | 9.10(w) x 6.30(h) x 1.30(d) |
About the Author
Bernadette H. Schell, PhD, is vice-provost at Laurentian University in Barrie, Ontario, Canada. She was formerly Founding Dean of Business and Information Technology at the University of Ontario Institute of Technology. Her published work includes The Hacking of America: Who's Doing It, Why, and How and Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications.
Table of Contents
List of Figures and Tables xv
Preface xvii
1 Background and History 3
The Growth and Adoption of the Internet from 1969 through the Present 3
Internet Defined 3
Gaining Authorized Access to the Internet and the Modes of Communication 7
Email 7
Listserv 8
Internet Relay Chat 8
Telnet 8
Social Networking Websites 9
Remote Retrieval 10
A Closer Look at the Adoption of the Internet in Developed Nations 12
A Closer Look at the Adoption of the Internet in Developing Nations 13
Assessing the Present-Day Internet Economy on a Global Scale 15
Getting Unauthorized Network Access by Black Hat Hacking or Cracking 17
Hacker and Cracker Defined 17
Classifying Hackers by Intentions 18
Classifying Hackers by Skill 21
Classifying Hackers as Insiders or Outsiders 23
A Cautionary Note on Hacker Classification Schemes and Overgeneralizing about Hackers 24
Various Types of Hacker Exploits Causing Harm and the Harm Inflicted 26
Hacking Exploits in the Use of Deception and Theft of Property or Data 28
Hacking Exploits Used in Cyberviolence 31
The Key Elements of Criminal Liability, Conventional Crimes, and Hacking 37
Conventional Crimes and the Four Key Elements of Criminal Liability 37
Hacking and the Four Key Elements of Criminal Liability 37
Hacker Predispositions: What the Literature Tells Us 38
Hackers: Known Traits of Insiders 38
Hackers: Known Traits of Outsider/External Attackers 39
Conclusion 43
References 44
2 Problems, Controversies, and Solutions 53
Fundamentals of Hack Attacks and Patches as a Countermeasure 54
The Basics of Hack Attacks 54
Patches: An Organizational Countermeasure for Hack Attacks 56
The Evolving Structure of the Internet: The Good News and the Bad 58
The Good News: A New and Exciting Information Era 58
The Bad News: The Evolution of the Internet Creates a New Playing Field for Network Attackers 60
A Further Look at the Purpose and Function of Firewalls 61
The Pros and Cons of Moving to "the Cloud," 62
Network Hacks: Recent Surveys on the Frequency and the Types of Harm Caused 64
15th Annual Computer Crime and Security Survey (2010/2011) 67
Respondent Sample 69
Key Study Findings 70
Concluding Remarks 71
2011 TELUS-Rotman Joint Study on Canadian IT Security Practices 71
Respondent Sample 72
Key Study Findings 73
Laws Created to Keep Abreast of the Evolving Internet 76
Health Insurance Portability and Accountability Act of 1996 78
U.S. State Data Breach Notification Law 79
Sarbanes-Oxley Act 81
Payment Card Industry Data Security Standard 82
Intellectual Property Rights and Copyright Infringement 82
International Privacy and Security Laws 84
Privacy Laws 84
Security Laws in the United States 85
Security Laws in Other Jurisdictions 87
Federal Information Security Management Act 88
Gramm-Leach-Bliley Act 90
Health Information Technology for Economic and Clinical Health Act 92
Payment Card Industry Payment Application Standard 92
The Militarization of Cyberspace 94
Industry "Best Practices" for Preventing Hack Attacks and Recovering from Them 96
Protection Strategies 96
For Hacktivism 96
For Malware 98
For Drive-by Downloads and Blackholes 99
For Software Vulnerabilities 100
For USB Drives and Other Mobile Devices Such as Tablets 101
For Cloud "Insecurity," 102
For Social Networks 103
The Need for Security Policies and Security Policy Checklists in Businesses and Government Agencies 105
The Importance of Intrusion Prevention, Intrusion Detection, and Intrusion Recovery 107
Intrusion Prevention Is Important 107
Intrusion Detection Is Important 108
Intrusion Recovery Is Important 109
How Well Enterprises Are Coping with Network Prevention, Intrusions, and Recovery 110
Crystal Ball Gazing: What Might the Future Bring? 112
Conclusion 114
References 115
3 Perspectives 121
Protecting Critical Infrastructures Bob Radvanosky 121
Examining Social Dynamics and Malware Secrets to Mitigate Net-centric Attacks Ziming Zhao G.-J. Ahn 128
The Role of Nation-States in Cyberartacks Max Kilger 135
The Case for Strong Data Breach Notification Legislation Douglas E. Salane 141
Data Breach Notification Legislation 141
The Need for Strong, Broad-Based Consumer Protections 142
Data Breach Costs 144
Why Attempts at Federal Legislation Fall Short 145
Concluding Remarks 147
A Criminologist's Perspective on the Implications of Criminological Research for Policies and Practices Aimed at Addressing Hacking and Malware Infection Adam M. Bossier 149
Implications for Parental and School Practices 149
Policy Implications for Law Enforcement 152
Hacking and Criminality Nathan Fisk 154
The Life Cycle of a Botnet Aditya K. Sood Richard J. Enbody 159
Taking the Fun out of Playtime: Real Crime and Video Games Rob D'Ovidio Murugan Anandarajan Alex Jenkins 164
Looking at Crime in Video Games through the Lens of Routine Activities Theory 165
4 Profiles 173
5 Data and Documents 239
Anti-Phishing Working Group: Phishing Activity Trends Report, Second Quarter 2012 240
The Malware Domain List 243
Ponemon Institute Study: 2011 Cost of Data Breach Study: United States 248
Symantec: Internet Security Threat Report 2011 253
A Closer Look at Corporate and Governmental Data Theft on a Global Basis: The 2012 Verizon Data Breach Investigations Report 260
The On-Land and Online Real-World Context 260
The Report's Main Findings 263
Report Conclusions 266
References 267
6 Resources 271
Print: Books 272
Print: Magazines, White Papers, News, and Downloadable Articles 293
Nonprint: Hacking Websites 299
Nonprint: Hacking-Related Films and Learn How-to-Hack Videos 300
Nonprint: Websites of Companies Offering Antivirus Software 302
Nonprint: Websites of Companies Offering Firewalls 305
Nonprint: Websites of Companies Offering Intrusion-Detection Systems 307
Nonprint: U.S. Government Agencies and Independent Organizations Fighting Malicious Hacking 308
7 Chronology 315
Prehistory (1800s-1969) 315
1815 to Mid-1800s 315
1920s-1950s 316
The Elder Days (1970-1979) 317
The Golden Age (1980-1989) 319
The Great Hacker Wars and Hacker Activism (1990-2000) 322
Fear of a Cyber-Apocalypse Era (2001-Present) 325
Glossary 329
About the Authors 343
Index 345