Counter Cyber Threats in the Classroom

By IGI Global on Nov 18, 2011
As businesses, organizations, governments, and everyday citizens become ever more reliant upon technology to perform essential tasks, the potential risk of cyber threats grows. Cyber-related crimes have become almost commonplace. For example, earlier this year millions of Sony customers had their personal information compromised when one or more hackers breached accounts for the Playstation Network, Qriocity, and Sony Online Entertainment services.

In another case at the beginning of this month, Adidas was forced to temporarily take down some of its Web sites in an effort to protect consumers, reported James Niccolai for IDG News. "On November 3, 2011, the Adidas Group found out that it was the target of a sophisticated, criminal cyber-attack," the company announced in an official statement. "Our preliminary investigation has found no evidence that any consumer data is impacted. But, while we continue our thorough forensic review, we have taken down affected sites, including,,, and various local eCommerce shops, in order to protect visitors to our sites."

Just this week Richard Clarke, "a top adviser to three presidents," advised U.S. president Barack Obama "against attacking other countries because so many of them -- including China, North Korea, Iran and Russia -- could retaliate by launching devastating cyberattacks that could destroy power grids, banking networks, or transportation systems," Lolita C. Baldor recently reported for the Associated Press.

The threat of cyber terrorism remains a constant one because of the ever-growing reliance on technology, argue the editors of IGI Global's Cyber Warfare and Cyber Terrorism. "Because of the enormous efficiencies gained over the past 25 years due to the introduction of computers and telecommunications technologies, organizations have a vested interest to maintain and sustain their deployment regardless of any residual issues," write Lech Janczewski, Ph.D., University of Auckland, New Zealand, and Andrew Colarik, Ph.D.,, USA, in this volume. "The use of these systems and networks means that there now is a major concentration and centralization of information resources. Such a consolidation creates a major vulnerability to a host of attacks and exploitations."Cyber Warfare and Cyber Terrorism

"Cultures are becoming closer through shared communications, and as a result are changing at faster rates than previously seen in recorded history," they write in the book's preface. Their enduring resource is a popular choice for IGI Global's course adoption program. "While these technologies have inherent benefits to unify disparate groups and nationalities, this is also creating ultra-minorities that may be inclined to engage in extremism in order to control these changes and compete in this unifying environment," they write.

IGI Global highly recommends Cyber Warfare and Cyber Terrorism for use in the university classroom. Our course adoption program allows educators within the United States and Canada to examine publications for 60 days. This gives academics time to determine whether this material is best suited for classroom instruction. Through this endeavor, books such as Cyber Warfare and Cyber Terrorism have reached the hands of educators and their students across the United States and Canada. If you are interested in IGI Global's course adoption program and would like to examine a copy of this publication or almost any other IGI Global book, please visit

Teaching cases can also help professors flesh out any university course, whether in security studies or any other field. If you are interested in adopting this book for use in your classroom, you may also wish to complement this resource with our Security Technologies, Ethics and Law teaching case studies, such as:

All teaching cases are now being offered for classroom use at a special student rate of $3.00 per case, per student! To search IGI Global's complete list of teaching cases, please visit IGI Global's teaching case search function has recently been made more accessible and easy to use. To learn about changes made to the teaching case search function, please visit

Browse for more posts in:
Cyber Warfare & TerrorismBooks & E-BooksCourse AdoptionSecurity and ForensicsTeaching Cases

No comments Comments

Log in or sign up to comment.
Be the first to comment!