Description
Test Bank for Cyberspace Cybersecurity and Cybercrime Kremling
Downloadable Instructor Test Bank for Cyberspace, Cybersecurity, and Cybercrime By Janine Kremling, Amanda M. Sharp Parker, ISBN: 9781506347257
Table Of Content
The Beginning of the Internet and Cyberspace
The Purpose of the Internet
Vulnerabilities of the Internet
What Distinguishes Cyberspace, the Internet, and the World Wide Web?
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Origins and Nature of Cybersecurity
Definitions
Definition of Cybersecurity
Cybersecurity Policies
Overview of Cyberspace Intrusions
Securing Your Wi-Fi in a Wireless World
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Appendix 2A
The Evolution of Cybercrime
Computers as a Target
Viruses, Worms, and Trojan Horses
Preventing Malware Intrusions
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Cybercrimes
Fraud and Financial Crimes
Cyberbullying
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Threats to Cybersecurity
What Motivates Hackers?
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Cyberwarfare
Nation-State Threats by Region
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
Cyberterrorism Defined
The Role of the Media
Evolution of the Threat
Technology Use by Extremists
Targets of Cyberterrorism
Risk Management
Damage Potential
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
The Surface Web
The Deep Web and Darknets
Accessibility
Products Available
Payment: Cryptocurrency
Law Enforcement Response
Operation Onymous
Anonymous and “Vigilante Justice”
Terrorist Presence on the Deep and Dark Web
Legal Issues
Summary
Key Terms
Discussion Questions
Internet Resources
Court Cases
Theoretical Operations
Learning Theory
Differential Association Theory
Subculture Theory
DEF CON Convention
Law Enforcement Operations
Target Hardening
Honeypots, Nets, and Tokens
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading
National Cybersecurity Policies
International Cybersecurity Policies
Legal Issues
Issues With Enforcement/Jurisdiction
Summary
Key Term
Discussion Questions
Internet Resources
Further Reading
Data Is the New Oil
Emerging Threats
Vulnerable Targets
Potential/Emerging Perpetrators
Summary
Key Terms
Discussion Questions
Internet Resources
Further Reading