|
|
|||
|
||||
OverviewIn 2013, the FBI started posting a new most wanted list—not for kidnappers, murderers, or armed robbers, but for online crooks. These ""Cyber's Most Wanted"" criminals have committed serious offenses ranging from hijacking Internet traffic to spying on businesses and governments. They steal online passwords and financial information, break into online bank accounts, install malicious software on computers, and hack into computers via spam and phishing e-mails. Cyber crime is serious business. Internet security companies report that worldwide cyber crimes cost consumers about $113 billion per year. Cyber crimes cost businesses around the world even more, up to $500 billion each year. Technology experts continue to improve security software, but the attacks keep coming. Hackers are hitting electrical power grids, oil and gas pipelines, and other critical national infrastructures. Cyber criminals relentlessly strike corporate computers, trying to steal financial data, industrial blueprints, and business plans. They steal passwords from personal computers, which in turn can give them access to credit card, Social Security, and bank account numbers. Some cyber criminals steal military secrets. Others disrupt the workings of governments and political organizations. Many cyber crooks are lone individuals while others work in gangs. Many cyber criminals use botnets, or armies of robot computers, to inflict massive damage that could not be accomplished with individual computers alone. Who are these criminals and what motivates them? How can we stop them—and what might happen if we don't? Full Product DetailsAuthor: Martin Gitlin , Margaret J. Goldstein , Martin GitlinPublisher: Lerner Publishing Group Imprint: Twenty-First Century Books Dimensions: Width: 17.70cm , Height: 0.90cm , Length: 21.10cm Weight: 0.272kg ISBN: 9781467725125ISBN 10: 1467725129 Pages: 72 Publication Date: 01 January 2015 Recommended Age: From 13 to 14 years Audience: Young adult , Primary & secondary/elementary & high school , Teenage / Young adult , Educational: Primary & Secondary Format: Hardback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsThe news is filled with cyber attacks on individuals, businesses, newspapers, corporations, and governments. Hardly any U.S. citizen has escaped the impact or inconvenience of such attacks. 'Cyber crimes cost consumers worldwide about $113 billion in 2013.' The sophisticated strategies and staggering statistics here are chilling. No security system is immune. Who are these attackers? Small cells of people who hack just for fun; groups who hack for governments (but whose governments deny them); and sanctioned government agencies whose hackers routinely spy on other governments (whether friends or foe). In fact, the authors cite Internet researcher Bill Woodcock, who predicts that 'any modern warfare will include a cyber warfare component.' Back to individuals: we may have security software on our mobile devices and laptops, but we aren't cautious and vigilant enough to keep them safe from hackers. With approachable text, appropriately placed and captioned color photos or illustrations, a full-page text box per chapter, extensive up-to-date source notes and resources, this is a must-read. Booklist --Journal Author InformationMargaret J. Goldstein was born in Detroit and graduated from the University of Michigan. She is an editor and the author of many books for young readers. She lives in Palm Springs, California. Tab Content 6Author Website:Countries AvailableAll regions |
||||