Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.
1 of 1 copy available
1 of 1 copy available
In 2013, the FBI started posting a new most wanted list—not for kidnappers, murderers, or armed robbers, but for online crooks. These "Cyber's Most Wanted" criminals have committed serious offenses ranging from hijacking Internet traffic to spying on businesses and governments. They steal online passwords and financial information, break into online bank accounts, install malicious software on computers, and hack into computers via spam and phishing e-mails. Cyber crime is serious business. Internet security companies report that worldwide cyber crimes cost consumers about $113 billion per year. Cyber crimes cost businesses around the world even more, up to $500 billion each year. Technology experts continue to improve security software, but the attacks keep coming. Hackers are hitting electrical power grids, oil and gas pipelines, and other critical national infrastructures. Cyber criminals relentlessly strike corporate computers, trying to steal financial data, industrial blueprints, and business plans. They steal passwords from personal computers, which in turn can give them access to credit card, Social Security, and bank account numbers. Some cyber criminals steal military secrets. Others disrupt the workings of governments and political organizations. Many cyber crooks are lone individuals while others work in gangs. Many cyber criminals use botnets, or armies of robot computers, to inflict massive damage that could not be accomplished with individual computers alone. Who are these criminals and what motivates them? How can we stop them—and what might happen if we don't?
  • Creators

  • Publisher

  • Release date

  • Formats

  • Languages

  • Levels

  • Reviews

    • Kirkus

      December 15, 2014
      A quick history of hacking, from the "phone phreaks" of the 1960s to today's attacks on commercial data stores large and small.Drawing solely from previously published reports and documents, the authors paint an alarming picture ("The internet has become a cyber criminal playground") as they trace the growth of increasingly sophisticated digital attacks on personal, corporate and government data systems. Though they rightly point out that many hackers, from early "phreaks" like Steve Jobs and Steve Wozniak on, have been motivated more by the pleasures of creating software or high-tech gear (or, as they acknowledge in the case of Edward Snowden, idealism) than criminal intent, most of the incidents they describe involve theft or espionage. Noting that attacks can come from anywhere in the world and that malware can be secretly installed not just on computers, but on any number of gadgets, the authors project little hope of keeping our information safe from bad guys. Nor do they offer more than, at best, bare mention of firewalls, encryption, two-step verification, strong passwords and other protective countermeasures. Still, readers will at least come away more aware of the range of hazards, from phishing and ransomware to botnets and distributed denial of service, as well as the huge, rapidly increasing amounts of money and data shadowy entities are raking in. A bare-bones introduction for readers without a pre-existing interest. (source notes, bibliography, further reading, index) (Nonfiction. 12-14)

      COPYRIGHT(2014) Kirkus Reviews, ALL RIGHTS RESERVED.

    • Booklist

      March 1, 2015
      Grades 8-12 The news is filled with cyberattackson individuals, businesses, newspapers, corporations, and governments. Hardly any U.S. citizen has escaped the impact or inconvenience of such attacks: Cyber crimes cost consumers worldwide about $113 billion in 2013. The sophisticated strategies and staggering statistics here are chilling. No security system is immune. Who are these attackers? Small cells of people who hack just for fun; groups who hack for governments (but whose governments deny their presence); and sanctioned government agencies whose hackers routinely spy on other governments (whether friend or foe). In fact, the authors cite Internet researcher Bill Woodcock, who predicts that any modern warfare will include a cyber-warfare component. Back to individuals: we may have security software on our mobile devices and laptops, but we aren't cautious and vigilant enough to keep them safe from hackers. With approachable text, appropriately placed and captioned color photos or illustrations, a full-page text box per chapter, and extensive up-to-date source notes and resources, this is a must-read.(Reprinted with permission of Booklist, copyright 2015, American Library Association.)

    • The Horn Book

      July 1, 2015
      A tour of internet tinkering begins with innocently inventive cyber explorers and leads progressively into an overview of the latest destructive cyber crimes. The schemes of hackers and other troublemakers are described in detail. Topics such as the "darknet" (internet underworld) and the "digital cold war" raise serious timely questions about increasing surveillance in defense of our expanding cyber space. Reading list, websites. Bib., ind.

      (Copyright 2015 by The Horn Book, Incorporated, Boston. All rights reserved.)

Formats

  • OverDrive Read
  • PDF ebook

Languages

  • English

Levels

  • Lexile® Measure:1270
  • Text Difficulty:10-12

Loading
Check Out What's Being Checked Out Right NowThe Ohio Digital Library is a program of the State Library of Ohio and is supported in whole or in part by federal Institute of Museum and Library Services funds, awarded to the State Library of Ohio.