This fully updated edition of the 2002 Choice Outstanding Academic Title opens with three chapters new to this edition introducing morality, ethics, and technology and value. The author demonstrates the central role of morality and ethics in the deliberations and decisions of people handling information technology. Also discussed in depth is the value technology adds and the role it plays in the decision-making process. Like the first edition, this book focuses on security issues with the intent of increasing the public’s awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our societies. The goal is public understanding of the nature and motives of cyber acts, how such acts are committed, and the efforts being undertaken to prevent future occurrences.
This is a practical short book about the internet and security. The start is rather slow as we get a discussion on what ethics are. After that we learn about networks from the ground up, with helpful simple diagrams of a token ring of computers, where a router and switch fit in a server network, where the firewall should be and more.
I like the dissection of different kinds of attack on a system and how to prevent them. DDOS and malware, backdoor, laptop theft, password cracking and so on. More could have been said, obviously, because as the author points out we keep building a better hacker. Systems for security tend to be either preventative or reactive. The book does feel a little dated now because we now have the Internet of Things but the principles are the same, for instance Bluetooth needs to be an approved version with encoding and security.
We are told that when a virus is present the anti-virus checkers are looking for: a known piece of code in a known virus, like a signature. A difference in the length of the program code. A difference in the number generated if you add all the binary digits that should be in the program code. This is called a checksum.
Even if you do not plan on using computers for a living, it is great to know how they work and how the antivirus programs work. This book will make the reader more aware of security. At the end we get a summary of reporting of computer crime possible legislation and cyber crime units that are needed. Then some questions for class discussion. I noticed the odd misspelling like 'detectoin'.
Notes P201 - 204. References 205 - 207. Index 209 - 213. I counted three names which I could be sure were female. I borrowed this book from the Dublin Business School Library. This is an unbiased review.