Vom Hacking zum Cyberwar (German Edition)

Amazon Price: $15.50 $15.50 (as of September 22, 2019 09:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Früher waren Hackerangriffe Einzeltaten von Cyberpunks, die nach Ruhm und Anerkennung in der Szene strebten. Die Entwicklung geht jedoch dahin, dass die Hacker von staatlichen Stellen gezielt zur Informationsgewinnung oder zur Störung der Infrastruktur in anderen Staaten eingesetzt werden. Das Recht steht hier vor großen Herausforderungen. Zunächst ist dabei das Computerstrafrecht zu untersuchen. Welche Phänomene werden erfasst? Sind diese Normen rechtsstaatlich tragfähig? Weiterhin werden die Fragen gestellt, welche Entwicklungen rechtstatsächlich zu erwarten sind und wie auf diese Herausforderungen reagiert werden kann und soll. Als Aufhänger dient dabei der Film "23 – Nichts ist so wie es scheint". Dieser Film behandelt den sog. KGB-Hack in den 1980er-Jahren. Dieses Ereignis war zum einen einer der Ausgangspunkte bei der Entwicklung des Computerstrafrechts. Zum anderen zeichnete sich schon damals die Entwicklung ab, dass Geheimdienste die Hacker für sich nutzbar machen wollen und können.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Rating: 
Amazon Price: N/A (as of September 23, 2019 03:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime.

The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
Continue reading “Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground”

Encyclopedia of Cyber Warfare

Rating: 
Amazon Price: N/A (as of September 22, 2019 17:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technological weapon of the 21st century.

• Provides comprehensive coverage of the major individuals, organizations, impacts, and issues related to cyber warfare that enables readers to better understanding of the impact of cyber warfare on modern conflicts
Continue reading “Encyclopedia of Cyber Warfare”

Policing Cybercrime: Networked and Social Media Technologies and the Challenges for Policing

Amazon Price: $175.00 $118.68 You save: $56.32 (32%). (as of September 23, 2019 03:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cybercrime has recently experienced an ascending position in national security agendas world-wide. It has become part of the National Security Strategies of a growing number of countries, becoming a Tier One threat, above organised crime and fraud generally. Furthermore, new techno-social developments in social network media suggest that cyber-threats will continue to increase. This collection addresses the recent 'inertia' in both critical thinking and the empirical study of cybercrime and policing by adding to the literature seven interdisciplinary and critical chapters on various issues relating to the new generation of cybercrimes currently being experienced. The chapters illustrate that cybercrimes are changing in two significant ways that are asymmetrical. On the one hand cybercrime is becoming increasingly professionalised, resulting in ’specialists’ that perform complex and sophisticated attacks on computer systems and human users. On the other, the ‘hyper-connectivity’ brought about by the exponential growth in social media users has opened up opportunities to ‘non-specialist’ citizens to organise and communicate in ways that facilitate crimes on and offline. While largely distinct, these developments pose equally contrasting challenges for policing which this book addresses.
This book was originally published as a special issue of Policing and Society.

Honeypots in Network Security: How to monitor and keep track of the newest cyber attacks by trapping hackers

Amazon Price: $65.00 $58.05 You save: $6.95 (11%). (as of September 22, 2019 05:02 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

People are checking their e-mails, surfing over the Internet, purchasing goods, playing online games, paying bills on the Internet everyday. However, while performing all these tasks, how many people think about security? Do they know the risks of being attacked, infected by malicious software? How many users are aware of that their computer may be used as zombie machines to target other victim systems? As technology is growing rapidly, newer attacks are appearing. Security is a key point to get over all these issues. In this thesis, we will make a real life scenario, using honeypots. Honeypot is a well designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviours in order to create more secure systems. Honeypot is also very useful for future threats to keep track of new attacks.