Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computer Network Security and Cyber Ethics - FOURTH EDITION Joseph…
Computer Network Security and Cyber Ethics
-
FOURTH EDITION
Joseph Migga Kizza
1. The Changing Landscape of Cybercrime
!
Efforts to Combat and Curtail Old and New Cybercrimes
2. Morality
Morality
Moral Theories
Moral Codes
The Need for a Moral Code
Moral Standards
Guilt and Conscience
The Purpose of Morality—The Good Life
3. Ethics
Ethical Theories
Consequentialist Theories
Deontological Theories
Codes of Ethics
Objectives of Codes of Ethics
The Relevancy of Ethics to Modern Life
4. Morality, Technology and Value
Moral Dilemmas, Decision Making, and Technology
Advances in Technology
Incomplete or Misleading Information
Making Good Use of Technology
Strengthening the Legal System
A New Conceptual Moral Framework
Moral and Ethics Education
Formal Education
Advocacy
5. Cyberspace Infrastructure
Computer Communication Networks
Network Types
Network Topology
Transmission Control Systems
Transmission Technology
Transmission Media
Connecting Devices
Communication Services
Transmission Protocols
An Example of a Computer Communication
Network Using TCP/IP: The Internet
Application Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
6. Anatomy of the Problem
Computer Network Infrastructure
Weaknesses and Vulnerabilities
IP-Spoofing
SYN Flooding
Sequence Numbers Attack
Scanning and Probing Attacks
Low Bandwidth Attacks
Session Attacks
Distributed Denial of Service Attacks
Ping of Death
Smurfing
Teardrop Attack
Land.c Attack
Network Operating Systems and
Software Vulnerabilities
Windows NT and NT Registry Attacks
UNIX
Knowledge of Users and
System Administrators
Society’s Dependence on Computers
Lack of Planning
Complacent Society
Inadequate Security Mechanisms
and Solutions
Poor Reporting of a Growing Epidemic
of Computer Crimes
7. Enterprise Security
8. Information Security Protocols and Best Practices
9. Security and Privacy in Online Social Networks
10. Security in Mobile Systems
11. Security in the Cloud
12. Security and Compliance