Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Record 23 of 34
Results Page:  Previous Next
Author Gitlin, Marty, author.

Title Cyber attack / Margaret J. Goldstein and Martin Gitlin. [Boundless electronic resource]

Publication Info. Minneapolis : Twenty-First Century Books, [2015]
QR Code
Description 1 online resource (72 pages) : illustrations (some color)
text file rda
Summary In 2013, the FBI started posting a new most wanted list'not for kidnappers, murderers, or armed robbers, but for online crooks. These "Cyber's Most Wanted" criminals have committed serious offenses ranging from hijacking Internet traffic to spying on businesses and governments. They steal online passwords and financial information, break into online bank accounts, install malicious software on computers, and hack into computers via spam and phishing e-mails. Cyber crime is serious business. Internet security companies report that worldwide cyber crimes cost consumers about $113 billion per year. Cyber crimes cost businesses around the world even more, up to $500 billion each year. Technology experts continue to improve security software, but the attacks keep coming. Hackers are hitting electrical power grids, oil and gas pipelines, and other critical national infrastructures. Cyber criminals relentlessly strike corporate computers, trying to steal financial data, industrial blueprints, and business plans. They steal passwords from personal computers, which in turn can give them access to credit card, Social Security, and bank account numbers. Some cyber criminals steal military secrets. Others disrupt the workings of governments and political organizations. Many cyber crooks are lone individuals while others work in gangs. Many cyber criminals use botnets, or armies of robot computers, to inflict massive damage that could not be accomplished with individual computers alone. Who are these criminals and what motivates them' How can we stop them'and what might happen if we don't'
Audience 1270 Lexile.
Summary Discusses cyber crime, including what cyber crime costs American consumers annually and what level of threat is posed to the national infrastructure.
Bibliography Includes bibliographical references (pages 64-68) and index.
System Details Requires Boundless App.
Subject Computer crimes -- Juvenile literature.
Computer crimes -- Prevention -- Juvenile literature.
Computer security -- Juvenile literature.
Computer crimes.
Computer crimes -- Prevention.
Computer security.
Computer crimes.
Computer crimes -- Prevention.
Computer security.
Genre Electronic books.
Juvenile works.
Added Author Goldstein, Margaret J., author.
Other Form: Electronic reproduction of (manifestation): Gitlin, Marty. Cyber attack Minneapolis : Twenty-First Century Books, [2015] 9781467725125 (DLC) 2014012242 (OCoLC)875884438
ISBN 9781467763042 : $33.32
1467763047 : $33.32
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information