Computer Network Security and Cyber Ethics

Rónán O’Beirne (Senior Information Officer, West Yorkshire TAP)

Library Review

ISSN: 0024-2535

Article publication date: 1 December 2002

966

Keywords

Citation

O’Beirne, R. (2002), "Computer Network Security and Cyber Ethics", Library Review, Vol. 51 No. 9, pp. 481-482. https://doi.org/10.1108/lr.2002.51.9.481.6

Publisher

:

Emerald Group Publishing Limited


This paperback in six chapters outlines in considerable detail the whole area of cybercrime and security. The key message of the text is a simple one. Many of the threats, although dressed in a language suited to the world of espionage, are in fact quite real. Readers, armed with the fundamental knowledge and advice given in this book, could take major steps to avoid such nasties as cyber attacks and denial of service attacks.

Chapter one describes the infrastructure of the World Wide Web and other distributed networking system. It explains the communication protocols used in such systems and identifies weaknesses which the cyber criminal typically exploits. Chapters two and three look at some human aspects of the whole phenomenon. The motivation behind cyber attacks – disgruntled employees, attention seekers and political causes – are explored. Also there is a typology and thorough explanation of the various cybercrimes committed.

Chapter four looks at both the commercial and social consequences of the rise of cybercrime. This chapter is particularly useful, listing some notorious attacks and noting that many organisations, particularly governments and corporations, for reasons of public confidence rarely report the true extend of their security breaches. Well‐known examples include the hackers who in 1999 seized control of the British military communication satellite and demanded a ransom although British officials deny that the attack ever took place.

Chapter five looks at solutions, defences and remedies, listing some of the steps that can be taken at a low level of security, these include vulnerability scanning and the use of virus scanning software. This chapter also introduces some interesting aspects such as cryptology and network forensics. Cryptology has come a long way since the times of Julius Ceasar when the message sender shaved the head of a slave then tattooed the message onto the scalp. The hair was allowed to regrow and the receiver then shaved the head of the slave in order to read the message. Chapter six opens with the sentence:

The years since the Web component of the Internet started have been a period of excitement, bewilderment, and expansion of opportunities beyond the imagination and predictions of many.

No argument with that statement from here. This final chapter takes a cautious look at the future of communications technology. Contentious issues, such as privacy and intellectual property rights are tackled. One of the most interesting and indeed frightening areas is that of personal identity. This is where individuals are given the sole right to the use of their personal attributes like a driving licence number or social security number to prevent or at least make it illegal for others to use such attributes.

An Appendix carries exercise questions for classroom use and this academic audience is probably one of the main audiences of this book, although those who have much at stake in the cyber world could do themselves a favour by reading this text.

Related articles