The first point that is highlighted in this chapter is the cars in a dealership, by providing the last name you could get any car out of the dealership without someone checking if it is actually you? The security mindset is not enough for providing protection in different systems, the meaning of security and feeling is also different in the sense of thoughts and analyses, security has great link with feelings, security is considered meaningful when we feel secure and not helpful in the field where we are not satisfied (A. Shamir). So the feeling of security are the related part of where it is not actually true, after a lot of analyses and observations of different fields it is found out that people make most trade-offs based on feeling of security and not the reality of it. Emotion and reason also vary in the sense of security like a person taking some security steps against some dangerous disease even he/she may not even encounter it, so the emotion works more than reason. The chapter of crime, terrorism, spying and war is also a chapter of this book that present a great deal of information about cybercrime that is growing exponentially in the world of technology, one side of new technology and advancements that it provides great protection and satisfaction but hacks and breaches are also increasing due to the new methods of hacking. …show more content…
Now information security is the elephant in the room in the cyber world, Chinese cyber attackers are the main topic of discussion in this chapter as they are famous for hacking all over the world and they are provided the tools and methods for hacking advance technology. Cybercrimes are a violation of many internet privacy laws and is totally different from physical kinds of crimes and also the negligence of the Computer Fraud and Abuse Act of 1986 and Cyber Security Enhancement Act of 2002, it …show more content…
The information that is stored electronically is physical and such information cannot charge under more traditional criminal’s statutes (John R). The internet fraud statutes included wire fraud, email fraud, money laundering and hacked passwords and it is passed by Congress in 1986. All of the online shopping websites and stores which are known as E-stores are using it to control and avoid all the external attacks to their vital information. This security control is also very helpful to reduce the vulnerabilities in database thus organizations can secure their data and information more easily. E-banking is also using the same security control to avoid E-banking crimes, because we know that all the banks are have online account access, that’s why this security control is easily securing all the vital information of the