Cyberattacks
From the Set Scientific American Explores Big Ideas
The ubiquity of computers and smartphones has reshaped nearly every aspect of contemporary life, from how we communicate to how we shop. However, it has also provided a new avenue for criminal activity. Cyberattacks can take many forms, but in general they involve hackers gaining unauthorized access to computers or Internet networks in order to change, destroy, disable, or steal information. These attackers can be private individuals launching cyberattacks for financial gain, governments and state-sponsored groups using cyberattacks to spy on their enemies or attack their infrastructure, and hacktivists who use attacks to reveal illegal or immoral activity. This volume examines the various applications of cyberattacks, how they occur, and what can be done to prevent them.
SLJ Review of Scientific American Explores Big Ideas
These titles each collect articles on a common topic, and the articles within each book are grouped by theme. For instance, articles on cyberattacks cover big data, infrastructure attacks, white hat hackers, and other areas of interest. Several features make these books useful in the classroom. Reading speed and available time can be accommodated by selecting from the various lengths of articles (ranging from one to 18 pages). Another strength that makes them perfect for classroom debate and discussion is the variety of viewpoints presented. An introduction, a glossary, and a list of sources for further information support each collection. Author information is included with some articles, providing readers with the background and expertise of the writer(s) and their particular perspective on the issue. VERDICT A useful collection for discussion, debate, or research on different aspects of the various topics.