Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Corporate Computer Security by Randall Boyle & Raymond Panko | Pearson 2015 Edition | Cybersecurity Fundamentals

Beoordeling
-
Verkocht
-
Pagina's
673
Cijfer
A
Geüpload op
09-11-2025
Geschreven in
2025/2026

Access Corporate Computer Security (Pearson, 2015 Edition) by Randall J. Boyle and Raymond R. Panko. This textbook provides a comprehensive overview of modern cybersecurity principles, risk management, encryption, intrusion detection, and incident response. Designed for IT professionals, students, and educators seeking to strengthen organizational data protection and network security practices.

Meer zien Lees minder
Instelling
Corporate Computer Security
Vak
Corporate Computer Security

Voorbeeld van de inhoud

GlOBal
ediTiOn

Corporate
Computer Security
FOURTH ediTiOn




Randall J. Boyle | Raymond R. Panko

, Fourth Edition




Corporate Computer
Security

Global Edition



Randall J. Boyle
Longwood University

Raymond R. Panko
-
University of Hawai`i at Manoa




Boston Columbus Indianapolis New York San Francisco Upper Saddle River
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

, To Courtney Boyle, thank you for your patience, kindness,
and perspective on what’s most important in life.
—Randy Boyle
To Julia Panko, my long-time networking and security editor
and one of the best technology minds I’ve ever encountered.
—Ray Panko
Editor in Chief: Stephanie Wall Head of Learning Asset Acquisition, Global Edition:
Executive Editor: Bob Horan Laura Dent
Program Manager Team Lead: Ashley Santora Assistant Acquisitions Editor, Global Edition: Debapriya Mukherjee
Program Manager: Denise Vaughn Project Editor, Global Edition: Amrita Naskar
Director of Marketing: Maggie Moylan Media Producer, Global Edition: Vikram Kumar
Executive Marketing Manager: Anne Fahlgren Senior Manufacturing Controller, Production, Global Edition:
Project Manager Team Lead: Judy Leale Trudy Kimber
Project Manager: Tom Benfatti Cover Designer: PreMediaGlobal
Operations Specialist: Michelle Klein Cover Image: Devis Da Fre’/Shutterstock
Creative Director: Jayne Conte Digital Production Project Manager: Lisa Rinaldi
Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate page
within text.
Pearson Education Limited
Edinburgh Gate
Harlow
Essex CM20 2JE
England
and Associated Companies throughout the world
Visit us on the World Wide Web at: www.pearsonglobaleditions.com
© Pearson Education Limited 2015
The rights of Randall J. Boyle and Raymond R. Panko to be identified as the authors of this work have been asserted by them in accordance
with the Copyright, Designs and Patents Act 1988.
Authorized adaptation from the United States edition, entitled Corporate Computer Security, 4/e, ISBN 978-0-13-354519-7, by Randall J.
Boyle and Raymond R. Panko, published by Pearson Education © 2015.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license permit-
ting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC
1N 8TS.
All trademarks used herein are the property of their respective owners.The use of any trademark in this text does not vest in the author or
publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement
of this book by such owners.
Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and
related graphics published as part of the services for any purpose. All such documents and related graphics are provided “as is” without
warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information,
including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-
infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any
damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out
of or in connection with the use or performance of information available from the services.
The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically
added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the
program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified.
Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is not
sponsored or endorsed by or affiliated with the Microsoft Corporation.
Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations
appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps.
ISBN 10: 1-292-06045-X
ISBN 13: 978-1-292-06045-3 (Print)
ISBN 13: 978-1-292-06659-2 (PDF)
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
10 9 8 7 6 5 4 3 2 1
14 13 12 11 10
Typeset in Times, 10/12 by Integra Software Services Pvt. Ltd
Printed and bound by Courier Westford in the United States of America

, ContEntS

Preface 19
About the Authors 25

Chapter 1 The Threat Environment 27 Social Engineering in Malware 49
1.1 Introduction 28 Spam 50
phiShinG 50
Basic Security Terminology 28
Spear phiShinG 52
The ThreaT environmenT 28
SecuriTy GoalS 29 hoaxeS 53
compromiSeS 29 1.4 Hackers And Attacks 53
counTermeaSureS 29 Traditional Motives 53
1.2 Employee And Ex-Employee Anatomy of a Hack 54
Threats 35 TarGeT SelecTion 54
Why Employees Are Dangerous 35 reconnaiSSance probeS 55
Employee Sabotage 37 The exploiT 56
Employee Hacking 38 SpoofinG 56
Employee Financial Theft and Theft of Social Engineering in an Attack 57
Intellectual Property 38 Denial-of-Service Attacks 59
Employee Extortion 39 Skill Levels 61
Employee Sexual or Racial 1.5 The Criminal Era 62
Harassment 40
Dominance by Career Criminals 62
Employee Computer and Internet cybercrime 62
Abuse 40 inTernaTional GanGS 63
inTerneT abuSe 40
black markeTS anD markeT
non-inTerneT compuTer abuSe 41 SpecializaTion 64
Data Loss 41 Fraud, Theft, and Extortion 67
Other “Internal” Attackers 42 frauD 67
1.3 Malware 42 financial anD inTellecTual properTy
Malware Writers 42 ThefT 67
exTorTion aGainST corporaTionS 68
Viruses 42
Worms 44 Stealing Sensitive Data about
Customers and Employees 69
Blended Threats 46
carDinG 69
Payloads 46
bank accounT ThefT 69
Trojan Horses and Rootkits 46 online STock accounT ThefT 69
nonmobile malware 46 iDenTiTy ThefT 69
Trojan horSeS 47
The corporaTe connecTion 70
remoTe acceSS TrojanS 47
corporaTe iDenTiTy ThefT 70
DownloaDerS 48
Spyware 48 1.6 Competitor Threats 71
rooTkiTS 49 Commercial Espionage 71
Mobile Code 49 Denial-of-Service Attacks 72

3

Geschreven voor

Instelling
Corporate Computer Security
Vak
Corporate Computer Security

Documentinformatie

Geüpload op
9 november 2025
Aantal pagina's
673
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$16.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
sammysamcho Chamberlain College Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
13
Lid sinds
9 maanden
Aantal volgers
6
Documenten
1179
Laatst verkocht
5 dagen geleden
Study Resources

Welcome to my Stuvia shop! Here you’ll find high-quality study guides, exam prep materials, summaries, and notes to help you save time and boost your grades. All documents are well-organized, easy to understand, and created to make your learning experience easier. Whether you’re preparing for exams or reviewing coursework, you’ll find reliable resources here.

2.5

2 beoordelingen

5
0
4
1
3
0
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen