Chapter 17 resources for the Cyberlaw book
By John Bandler
This page has resources specific for this chapter.
Looking to navigate to another place?
- Cyberlaw Book Resources (main resources page)
- Cyberlaw main book page
- Udemy course on cyberlaw
- Previous chapter
- Next chapter
Chapter 17: Introduction to Cybersecurity and Cybercrime Prevention
In this chapter we introduce the basics of cybersecurity and information security. We start with Bandler's Four Pillars of Cybersecurity because that is a simple way to get started and conceptualize what needs to be done. We defined information security and cybersecurity, discuss decision making and management, including risk management. Then we lay out the basics of information security (CIA), authentication, authorization, encryption, cybersecurity frameworks, and introduce cybersecurity laws.
Chapter references, resources, and additional reading
- Chapter 17 resources, https://johnbandler.com/cyberlawbook-resources-ch17/ (this page)
- Foundations within the book
- Chapter 14 (cybercrime)
- Chapter 16 (technology)
- Cybersecurity, https://johnbandler.com/cybersecurity/
- Information security, https://johnbandler.com/information-security/
- Four Pillars of Cybersecurity, https://johnbandler.com/bandlers-four-pillars-of-cybersecurity/
- Cybersecurity program, https://johnbandler.com/cybersecurity-program/
- Build Bandler's Cybersecurity Program yourself, https://johnbandler.com/build-bandlers-cybersecurity-program-yourself/
- Introduction to cybersecurity and information security, https://johnbandler.com/introduction-cybersecurity-information-security/
- Cybersecurity things to know, https://johnbandler.com/things-to-know-cybersecurity/
- Risk, https://johnbandler.com/risk/
- Video: What is Cybersecurity (in 17 minutes), https://youtu.be/mOhLbFWxMWc
- Udemy course, Cybersecurity for the Home and Organization, https://johnbandler.com/udemy-courses/
- Prior books:
- Cybersecurity for the Home and Office, Chapter 4 and throughout (2017 book)
- Cybercrime Investigations, Chapter 4 (2020 book)
Chapter questions
- Cybersecurity things to know, https://johnbandler.com/things-to-know-cybersecurity/
- What is the difference between information security and cybersecurity?
- List the three information security objectives (CIA)
- Briefly summarize the three information security objectives (CIA)
- List the three types of controls (safeguards) to help achieve good cybersecurity (PAT)
- Briefly summarize the three types of controls (safeguards) to help achieve good cybersecurity (PAT)
- What is authentication in context of computers?
- List the three factors of authentication (and give an example of each).
- What is two factor authentication?
- Why should we employ two-factor authentication on email and other important cloud and internet accounts?
Links and information
- The book: Cyberlaw: Law for Digital Spaces and Information Systems, by John Bandler
- Cyberlaw Book Resources (main resources page)
- Cyberlaw book FAQ
- Cyberlaw main book page


- Amazon - John's Author page
- Udemy online course on cyberlaw
(other online courses too) - Services
This page is hosted at https://johnbandler.com/cyberlawbook-resources-ch17, copyright John Bandler, all rights reserved.
Originally posted 11/20/2024. Updated 12/16/2025.
