Auto boutiques-francophones Simple and secure cloud storage summerbaby Cook Kindle Music Deals Store Cycling Tools minions
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Information Insecurity: A Survival Guide to the Uncharted Territories of Cyber-threats And Cyber-security Paperback – Jul 31 2005

See all formats and editions Hide other formats and editions
Amazon Price New from Used from
"Please retry"
CDN$ 72.36 CDN$ 62.12

Unlimited FREE Two-Day Shipping for Six Months When You Try Amazon Student

Product Details

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) 1 review
educates a general audience Sept. 10 2005
By W Boudville - Published on
Format: Paperback
This guide is written for a general, non-technical audience. It attempts to educate the reader in the common types of malware and cyber attacks that are now seen globally. The scope of the threats vary. Some are the equivalent of graffiti on billboards. Breakins to computers just for the heck of it. Hooliganism, as the book calls it.

But there are more serious attacks. Phishing-style, for example. Where financial fraud is being tried on an unwary user. No adequate technical answer is given to this by the book.

Further along the scale of severity is cyber terrorism, or even cyber war. These are disguished by the former being done by groups unaffiliated with any government. While the latter is, or might be, performed by one government on another. Thus far, few real and damaging examples of cyber terrorism have surfaced. Nuisance value events that might be construed as cyber terrorism have occasionally surfaced in recent years. But nothing more dire.