Chapter 17 resources for the Cyberlaw bookResources and Links for the book Cyberlaw: Law for Digital Spaces and Information Systems, by John Bandler

By John Bandler

This page has resources specific for this chapter.

Looking to navigate to another place?

Chapter 17: Introduction to Cybersecurity and Cybercrime Prevention

In this chapter we introduce the basics of cybersecurity and information security. We start with Bandler's Four Pillars of Cybersecurity because that is a simple way to get started and conceptualize what needs to be done. We defined information security and cybersecurity, discuss decision making and management, including risk management. Then we lay out the basics of information security (CIA), authentication, authorization, encryption, cybersecurity frameworks, and introduce cybersecurity laws.Cyberlaw book by John Bandler Chapter 17 page 169

Chapter references, resources, and additional reading

Chapter questions

  • Cybersecurity things to know, https://johnbandler.com/things-to-know-cybersecurity/
  • What is the difference between information security and cybersecurity?
  • List the three information security objectives (CIA)
  • Briefly summarize the three information security objectives (CIA)
  • List the three types of controls (safeguards) to help achieve good cybersecurity (PAT)
  • Briefly summarize the three types of controls (safeguards) to help achieve good cybersecurity (PAT)
  • What is authentication in context of computers?
  • List the three factors of authentication (and give an example of each).
  • What is two factor authentication?
  • Why should we employ two-factor authentication on email and other important cloud and internet accounts?

Links and information

This page is hosted at https://johnbandler.com/cyberlawbook-resources-ch17, copyright John Bandler, all rights reserved.

Originally posted 11/20/2024.  Updated 12/16/2025.