The Art of Intrusion

The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Author: Kevin D. Mitnick,William L. Simon

Publisher: John Wiley & Sons

ISBN: 9780470503829

Category: Computers

Page: 288

View: 9683


Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Internet Predators

Author: Harry Henderson

Publisher: Infobase Publishing

ISBN: 143812550X

Category: Computer crimes

Page: 305

View: 6332


Provides an overview of issues related to criminal and antisocial activity that occurs online, including history, terminology, biographical information on important individuals, and a complete annotated bibliography.

Behavioral Cybersecurity

Applications of Personality Psychology and Computer Science

Author: Wayne Patterson,Cynthia E. Winston-Proctor

Publisher: CRC Press

ISBN: 0429866844

Category: Computers

Page: 262

View: 3011


Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation. Yet, Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place in cybersecurity over many years, has been done by those with computer science, electrical engineering, and mathematics backgrounds. However, many cybersecurity researchers have come to realize that to gain a full understanding of how to protect a cyber environment requires not only the knowledge of those researchers in computer science, engineering and mathematics, but those who have a deeper understanding of human behavior: researchers with expertise in the various branches of behavioral science, such as psychology, behavioral economics, and other aspects of brain science. The authors, one a computer scientist and the other a psychologist, have attempted over the past several years to understand the contributions that each approach to cybersecurity problems can benefit from this integrated approach that we have tended to call "behavioral cybersecurity." The authors believe that the research and curriculum approaches developed from this integrated approach provide a first book with this approach to cybersecurity. This book incorporates traditional technical computational and analytic approaches to cybersecurity, and also psychological and human factors approaches, as well. Features Discusses profiling approaches and risk management Includes case studies of major cybersecurity events and "Fake News" Presents analyses of password attacks and defenses Addresses game theory, behavioral economics and their application to cybersecurity Supplies research into attacker/defender personality and motivation traits Techniques for measuring cyber attacks/defenses using crypto and stego

Hackers and Hacking

A Reference Handbook

Author: Thomas J. Holt,Bernadette Hlubik Schell

Publisher: ABC-CLIO

ISBN: 1610692772

Category: Computers

Page: 354

View: 4206


This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. • Documents how computer hacking fits into various forms of cybercrime • Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking • Clarifies the subtle differences between ethical and malicious hacks • Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives

An Introduction to Hacking and Crimeware

A Pocket Guide

Author: Victoria Loewegart

Publisher: IT Governance Publishing

ISBN: 184928329X


Page: 53

View: 1272


A quick overview of the more serious threats posed by hackers and online criminals, and how you might combat them.

Careers in Computer Forensics

Author: Terry Teague Meyer

Publisher: The Rosen Publishing Group, Inc

ISBN: 1448895979

Category: Juvenile Nonfiction

Page: 80

View: 2036


In an age of growing cyber-crime, cyber-terrorism, hacker activism, and with the ever more central role of digital technology, it is inevitable that the computer will increasingly find itself at the heart of criminal activity and criminal investigations. Used as a powerful tool by both criminals and crime fighters, computers are now providing the virtual fingerprints, footprints, and smoking guns in many criminal investigations. The various kinds of jobs available at the local, state, and federal level are detailed, as are the relevant academic and professional requirements and expectations. Also covered are careers in the private sector relating to corporate security and anti-hacking efforts. Detailed discussions of educational pathways, job search strategies, interview techniques, and lifelong learning and career development/advancement are included. Steeped as it is in digital literacy and career preparedness, this power-packed resource also lends itself perfectly to the relevant Common Core curriculum standards for the reading of instructional texts.