Cybercrime – vandalizing the information society

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 October 2002

1488

Citation

Fitzgerald, K. (2002), "Cybercrime – vandalizing the information society", Information Management & Computer Security, Vol. 10 No. 4, pp. 196-196. https://doi.org/10.1108/imcs.2002.10.4.196.1

Publisher

:

Emerald Group Publishing Limited

Copyright © 2002, MCB UP Limited


General impression

Dr Steven Furnell’s experience as a writer and researcher in the field of computer security makes the subject of “cybercrime” both interesting and revealing. Steven is head of the Network Research Group at the University of Plymouth in UK.

This is a significant piece of work which unemotionally dissects the world of the hacker, the virus writer, and the saboteur, describing their motivations, justifications, techniques, tools, and culture. It is a feature of this book that the underlying reasons behind the vandalism is explored. Crimes usually involve satisfying some desire. What desire is being satisfied in cybercrime? By revealing some understanding here management can see that this is not only the acts of loners. This is a culture with strong networks that will persist to provide a constant threat. Information security is fast becoming an essential plank in the management of information.

The book maintains interest through the many examples which clearly illustrate the extent of the problem and how vulnerable many organizations have chosen to remain. Attack modi operandi are clearly explained and the tools that automate such attacks provide strong arguments for taking a professional responsibility towards protecting our information stores and systems.

Governments can see the advantage of emerging e‐commerce systems. One of the inhibitors to e‐commerce is the lack of trust in networks that are under constant and highly sensationalized attacks of vandalism. Society, through commercial offerings and legislation, has started the process of creating the security infrastructure needed to protect us from the cybercriminals. However, the book leaves us with a feeling that we have a long way to go to get it right. But it does leave us with some guidelines, none more important than the British Standard, BS 7799 focusing on information security.

New technologies will continue to provide their double‐edged sword – beneficial results for society and for the cybercriminal. The major problem in counteracting the vandals is the attitudes and awareness of managers all over the world.

In summary, this book is an authoritative and rigorous treatment of an important social issue that has been sensationalized and often trivialised. The resultant “it‐won’t‐happen‐to‐us” attitude must be arrested if we are to enjoy the benefits that the Internet and other networks promise. This book goes a long way to addressing this issue.

In terms of readability, the practical approach filled with examples and quotes brings the topic very close to the reader. In terms of useability, management will gain much from a read of this work. Proactive security requires this level of understanding and local governance rules/policies will assist the budget requirements. Finally, in terms of value, no organization can afford not to have this knowledge unless they have turned their backs on the twenty‐first century.

Related articles