Abstract
In today’s pervasive cyber world digital defense is a “must do” activity. Your financial assets, your good name, and even prudent protection against wrongful arrest all depend on your being careful online. And it is no longer just having an antivirus on your desktop computer. You need to take precautions with regard to your smart phone, Wi-Fi systems in your home, and office digital networks. In this chapter we tell you what is at stake and give you examples of things that can and do go wrong in the digital universe in which we all live. This is not just about protecting yourself. Your kids and even your parents can be attacked by cyberbullies or cyber-crooks and do a great deal of harm. You indeed have high stakes in the digital games being played on the Internet and our ever expanding cyber networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
David Raven, “Nanny terrified after man hacks baby monitor and calls little girl ''cute'' over speaker.” The Daily Mirror, January 28, 2015. http://www.mirror.co.uk/news/world-news/nanny-terrified-after-man-hacks-5056098
Southsea Man Helps Steal £22,000 from Woman's Bank Account After her E-mail is Hacked. http://www.southnews.org.uk/news/southsea-man-helps-steal-22000-from-womans-bank-account-after-her-e-mail-is-hacked.
Top Ten Identity Thefts, U.S. Internal Revenue Service. http://www.irs.gov/uac/Newsroom/IRS%E2%80%99s-Top-Ten-Identity-Theft-Prosecutions.
A Parents’ Guide to Cybersecurity, www.ConnectSafely.org/security.
“Mum turns troll-hunter and forces 500 cyberbullies off the internet” The Mirror, August 18, 2013. http://www.mirror.co.uk/news/uk-news/mum-turns-troll-hunter-forces-500-2180859
“Andrea Peterson, “How easy is it to hack an airplane?” Washington Post, April 21, 2015, p. A-14.
“Techopedia explains cyberattack.” http://www.techopedia.com/definition/24748/cyberattack
Susan Gallagher, “Inside CryptoWall 2.0: Ransomware, professional edition” ArsTechnica, Jan. 9, 2015., http://arstechnica.com/information-technology/2015/01/inside-cryptowall-2-0-ransomware-professional-edition .
Lillian Ablon, Martin C. Libicki, Andrea A. Golay, “Markets for Cybercrime Tools and Stolen Data: The Hackers' Bazaar” Rand Corporation Report, http://www.rand.org/pubs/research_reports/RR610.html (2014).
Ibid.
Somerville, Heather, “Retailers’ data breaches could get 'ugly' during holiday season” Mercury News, Nov. 27, 2014. http://www.mercurynews.com/business/ci_27025645/retailers-data-breaches-could-get-ugly-during-holiday .
“How To Make Passwords Obsolete” Information Week, April 7, 2015. http://www.informationweek.com/cloud/how-to-make-passwords-obsolete/d/d-id/1319775?_mc=NL_IWK_EDT_IWK_daily_20150408&cid=NL_IWK_EDT_IWK_daily_20150408 .
“Pharming and Phishing Definitions.” www.techterms.com/definition/pharming.
Space Launch Liability Indemnification Extension Act. U. S law that assumes liability from $500 million to $2.7 billion in the case of a launch disaster. Private insurance can be obtained for launch insurance up to $500 million.
Joseph N. Pelton, Indu Singh, ElenaSitnikov, “Cyber Threats, Extreme Solar Events and EMPs.” Inside Homeland Security, March 2015.
Ellen Nakashima, “U.S., 19 other nations crush criminal hacking ring” Washington Post, July 16, 2016, p. A4.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Pelton, J.N., Singh, I.B. (2015). What Is at Stake? What Should You Do? Why Should You Care?. In: Digital Defense. Springer, Cham. https://doi.org/10.1007/978-3-319-19953-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-19953-5_1
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19952-8
Online ISBN: 978-3-319-19953-5
eBook Packages: EngineeringEngineering (R0)