You are previewing Corporate Hacking and Technology-Driven Crime.
O'Reilly logo
Corporate Hacking and Technology-Driven Crime

Book Description

In an age when computer crime is growing at a exponential rate and on a global scale, industry and government leaders are increasingly reliant upon answers from the academic and IT Security fields in order to keep cyber crime in check, and be ahead of the “cyber criminal curve.” Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions. Including findings from experts in Criminal Justice, Business, and Information Technology Security from around the world, this book presents current research undertakings and findings in order to find interdisciplinary solutions to the complex domain of cyber crime and network breaches.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. List of Reviewers
  5. Preface
  6. Acknowledgment
  7. Section 1: Background
    1. Chapter 1: Computer Hacking and the Techniques of Neutralization
      1. ABSTRACT
      2. INTRODUCTION
      3. THIS CHAPTER’S FOCUS
      4. THE TECHNIQUES OF NEUTRALIZATION
      5. THE PRESENT STUDY
      6. DISCUSSSION
      7. CONCLUSION
      8. Appendix
    2. Chapter 2: Between Hackers and White-Collar Offenders
      1. ABSTRACT
      2. INTRODUCTION
      3. WHITE-COLLAR CRIME
      4. HACKING AND HACKERS: WHAT WE KNOW
      5. SIMILARITIES BETWEEN WHITE-COLLAR OFFENDERS AND HACKERS
      6. STUDY METHOD
      7. SOCIO-DEMOGRAPHIC CHARACTERISTICS: HACKERS VERSUS WHITE-COLLAR OFFENDERS
      8. ACCOUNTS; HACKERS VERSUS WHITE-COLLAR OFFENDERS
      9. DISCUSSION
      10. SUMMARY OF KEY STUDY FINDINGS
      11. CONCLUSION
    3. Chapter 3: The General Theory of Crime and Computer Hacking
      1. ABSTRACT
      2. INTRODUCTION
      3. THE PURPOSE OF THIS STUDY AND CHAPTER
      4. COMPUTER HACKING AND HACKING PROFILES DEFINED
      5. SELF-CONTROL THEORY AND POSSIBLE LINKS TO HACKING
      6. SOCIAL LEARNING THEORY AND ITS LINK TO HACKING
      7. PRESENT STUDY PARAMETERS
      8. DATA ANALYSIS
      9. DISCUSSION
      10. CONCLUSION
      11. LIMITATIONS OF PRESENT STUDY
    4. Chapter 4: Micro-Frauds
      1. ABSTRACT
      2. INTRODUCTION
      3. PART ONE: THE VIRTUAL BANK ROBBERY
      4. PART TWO: VIRTUAL STINGS
      5. PART THREE: VIRTUAL SCAMS
      6. PART FOUR: THE PREVALENCE OF MICRO-FRAUD AND THE CHALLENGE FOR CRIMINAL JUSTICE
      7. CONCLUSION
  8. Section 2: Frameworks and Models
    1. Chapter 5: Policing of Movie and Music Piracy
      1. ABSTRACT
      2. INTRODUCTION
      3. STUDY
      4. STUDY FINDINGS: ANALYZING SECURITY IN THE INTERNET GEOGRAPHY
      5. THE NATURE OF INTER-NODAL RELATIONSHIPS, OR GAPS
      6. CONCLUSION
  9. Section 3: Empirical Assessments
    1. Chapter 6: Deciphering the Hacker Underground
      1. ABSTRACT
      2. INTRODUCTION
      3. THIS STUDY’S APPROACH
      4. KEY STUDY FINDINGS: DIFFERENT PHASES AND SHIFTING MOTIVATIONS
      5. DISCUSSION
      6. CONCLUSION
    2. Chapter 7: Examining the Language of Carders
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. STUDY METHOD
      5. STUDY FINDINGS
      6. CONCLUSION
    3. Chapter 8: Female and Male Hacker Conferences Attendees
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCERNS OVER BOTNETS AND VIRUSES AND THEIR DEVELOPERS
      4. LITERATURE REVIEW ON HACKERS’ PREDISPOSITIONS
      5. ASPERGER SYNDROME AND AUTISM DEFINED
      6. THE NEW HACKER CONFERENCE STUDY HYPOTHESES, QUESTIONNAIRE INSTRUMENT, AND PROCEDURE
      7. STUDY FINDINGS
      8. CONCLUSION
  10. Section 4: Macro-System Issues Regarding Corporate and Government Hacking and Network Intrusions
    1. Chapter 9: Cyber Conflict as an Emergent Social Phenomenon
      1. ABSTRACT
      2. INTRODUCTION
      3. THE NATURE OF NON-STATE NETWORKS
      4. THIS CHAPTER’S FOCUS: HACKTIVISM, ELECTRONIC JIHAD, AND PATRIOTIC HACKING
      5. HACKTIVISM
      6. ELECTRONIC JIHAD
      7. PATRIOTIC HACKING
      8. CONCLUSION
    2. Chapter 10: Control Systems Security
      1. ABSTRACT
      2. INTRODUCTION
      3. VULNERABILITY CONCERNS ABOUT CONTROL SYSTEMS
      4. ATTACK VECTORS: CONTROL SYSTEMS MAY BE VULNERABLE TO ATTACK
      5. CONSEQUENCES OF CONTROL SYSTEM COMPROMISES AND REAL-LIFE OCCURRENCES
      6. SUGGESTED METHODS FOR SECURING CONTROL SYSTEMS
      7. SUGGESTED METHODS FOR IMPLEMENTING A MORE SECURED ENVIRONMENT FOR CONTROL SYSTEMS
      8. CAN CONTROL SYSTEMS BE AUDITED WITHOUT ANY MAJOR CONCERNS?
      9. FURTHER SUGGESTIONS FOR SAFEGUARDING INDUSTRI AL CONTROL SYSTEMS AGAINST COSTLY HACK ATTACKS
      10. THE ROLE OF THE U.S. CONTROL SYSTEMS SECURITY PROGRAM IN REDUCING CONTROL SYSTEM RISKS
      11. SCADA AND CONTROL SYSTEMS COMMUNITY CHALLENGES
      12. THE FUTURE OF SCADA AND CONTROL SYSTEMS
      13. CONCLUSION
  11. Section 5: Policies, Techniques, and Laws for Protection
    1. Chapter 11: Social Dynamics and the Future of Technology-Driven Crime
      1. ABSTRACT
      2. INTRODUCTION
      3. THE PSYCHOLOGICAL AND SOCIAL-PSYCHOLOGICAL ASPECTS OF MALICIOUS ACTORS
      4. CHANGES IN THE SOCIAL STRUCTURE OF THE HACKING COMMUNITY OVER TIME
      5. KILGER AND COLLEAGUES’ 2004 STUDY OF THE JARGON FILE
      6. THE ORIGINAL ANALYSIS AS A CONTRIBUTION TO UNDERSTANDING THE SOCIAL STRUCTURE OF THE HACKING COMMUNITY
      7. FUTURE THREATS IN CYBERSPACE
      8. CONCLUSION
      9. APPENDIX A
    2. Chapter 12: The 2009 Rotman-telus Joint Study on IT Security Best Practices
      1. ABSTRACT
      2. INTRODUCTION
      3. THE 2009 ROTMAN-TELUS IT SECURITY STUDY APPROACH AND THIS CHAPTER’S FOCUS
      4. THE 2009 STUDY FINDING THEMES
      5. APPENDIX A
  12. Compilation of References
  13. About the Contributors
  14. Index