Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuable technical insight about the means cybercriminals employ, as well as penetrating psychological insights into their criminal behavior and motivations. Using many riveting real-life crime stories to illustrate his points, he * Who your greatest security threats really are (be prepared for some surprises!) * Why employees undergoing divorce can be your organization's greatest computer security risk * How to overcome cyberterrorists who will employ any high-tech or low-tech means necessary to crash your systems. * Effective countermeasures for each threat covered in the book * How to neutralize even the most powerful cybercrime scheme attempts * Why and how the incorrect, incomplete, inarticulate security folk art must be revitalized
When I first read this book, I thought it was different than most text at the time. Donn Parker had some original ideas and was not afraid to argue these ideas. If you are in the information security domain, you must have this book.
Let me give you an example of why I respect Mr. Parker as a contributor to this domain. When you hear of loss modeling, people speak in terms of CIA (Confidentiality, Integrity, and Availability) Mr. Parker has been arguing for years that these three classes are insufficient. The sufficient set would also include three more classes of loss: Utility, Authenticity, and Possession. I completely agree. The only argument you could entertain is that the CIA model is simpler and that simpler wins over comprehensiveness. I still think Mr. Parker is right and we will soon find ourselves needing the more comprehensive model very soon.
I think this is no longer a "new" framework but still a valid insight into information security. One pause I took with this book is the author's complete aversion to information security risk assessment. Unfortunately, there are federal laws that mandate them so we cannot eschew them entirely. I do agree with the author's advocacy of managing security via gap assessments to well-known, vetted security standards and frameworks.