Cybercrime and Business: Strategies for Global Corporate Security examines the three most prevalent cybercrimes afflicting today’s corporate security professionals: piracy, espionage, and computer hacking. By demonstrating how each of these threats evolved separately and then converged to form an ultra-dangerous composite threat, the book discusses the impact the threats pose and how the very technologies that created the problem can help solve it.
Cybercrime and Business then offers viable strategies for how different types of businesses—from large multinationals to small start-ups—can respond to these threats to both minimize their losses and gain a competitive advantage. The book concludes by identifying future technological threats and how the models presented in the book can be applied to handling them.
Key Features
- Demonstrates how to effectively handle corporate cyber security issues using case studies from a wide range of companies around the globe
- Highlights the regulatory, economic, cultural, and demographic trends businesses encounter when facing security issues
- Profiles corporate security issues in major industrialized, developing, and emerging countries throughout North America, Europe, Asia, Latin America, Africa, and the Middle East
- Shakarian and Ruef, Introduction to Cyber-Warfare, Syngress, Jun 2013, 9780124078147, $49.95
- Andress and Winterfeld, Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, Syngress, Jun 2011, 9781597496377, $39.95
- Sennewald and Baillie, Effective Security Management, 6/e, BH, Sep 2015, 9780128027745, $79.95
- Gragido, Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats, Syngress, Feb 2011, 9781597496131, $59.95
- Vacca, Managing Information Security, 2/e, Syngress, Sep 2013, 9780124166882, $49.95
- Shimeall and Spring, Introduction to Information Security, Nov 2013, Syngress, 9781597499699, $74.95
- Loukas, Cyber-Physical Attacks, Jun 2015, BH, 9780128012901, $49.95
1) Security executives and managers in a wide range of companies and industries worldwide 2) Students taking undergraduate or graduate courses in information security, risk management, business asset protection, security management, strategic management, and international business, 3) Government and law officials who deal with corporate security issues involving piracy, espionage, and computer hacking