Jump to ratings and reviews
Rate this book

Computer Crime

Rate this book
Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuable technical insight about the means cybercriminals employ, as well as penetrating psychological insights into their criminal behavior and motivations. Using many riveting real-life crime stories to illustrate his points, he
* Who your greatest security threats really are (be prepared for some surprises!)
* Why employees undergoing divorce can be your organization's greatest computer security risk
* How to overcome cyberterrorists who will employ any high-tech or low-tech means necessary to crash your systems.
* Effective countermeasures for each threat covered in the book
* How to neutralize even the most powerful cybercrime scheme attempts
* Why and how the incorrect, incomplete, inarticulate security folk art must be revitalized

532 pages, Paperback

First published January 1, 1983

67 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
4 (28%)
4 stars
5 (35%)
3 stars
3 (21%)
2 stars
1 (7%)
1 star
1 (7%)
Displaying 1 - 2 of 2 reviews
Profile Image for TK Keanini.
305 reviews80 followers
April 10, 2007
When I first read this book, I thought it was different than most text at the time. Donn Parker had some original ideas and was not afraid to argue these ideas. If you are in the information security domain, you must have this book.

Let me give you an example of why I respect Mr. Parker as a contributor to this domain. When you hear of loss modeling, people speak in terms of CIA (Confidentiality, Integrity, and Availability) Mr. Parker has been arguing for years that these three classes are insufficient. The sufficient set would also include three more classes of loss: Utility, Authenticity, and Possession. I completely agree. The only argument you could entertain is that the CIA model is simpler and that simpler wins over comprehensiveness. I still think Mr. Parker is right and we will soon find ourselves needing the more comprehensive model very soon.
Profile Image for Matt.
165 reviews
March 18, 2013
I think this is no longer a "new" framework but still a valid insight into information security. One pause I took with this book is the author's complete aversion to information security risk assessment. Unfortunately, there are federal laws that mandate them so we cannot eschew them entirely. I do agree with the author's advocacy of managing security via gap assessments to well-known, vetted security standards and frameworks.
Displaying 1 - 2 of 2 reviews