Cyber Crime and Cyber Terrorism Investigator's Handbook 🔍
Babak Akhgar (editor), Andrew Staniforth (editor), Francesca Bosco (editor) Syngress, 1, US, 2014
英语 [en] · PDF · 2.4MB · 2014 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.
Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.
Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime.
Written by experts in cyber crime, digital investigations, and counter-terrorism Learn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigators Keep up to date on current national and international law regarding cyber crime and cyber terrorism See just how significant cyber crime has become, and how important cyber law enforcement is in the modern world
备用文件名
nexusstc/Cyber Crime and Cyber Terrorism Investigator's Handbook/0ac1e751cfb3f1633ab838d97ab9fdf6.pdf
备用文件名
lgrsnf/9780128007433.Elsevier.Cyber_Crime_and_Cyber_Terrorism_Investigator's_Handbook.Babak_Akhgar.Jul.2014.pdf
备用文件名
zlib/Computers/Networking/Babak Akhgar (editor), Andrew Staniforth (editor), Francesca Bosco (editor)/Cyber Crime and Cyber Terrorism Investigator's Handbook_16674339.pdf
备选作者
Babak Akhgar; Andrew Staniforth; Francesca M Bosco; Steve Elliot; Benjamin Rearick; Priya Kumaraguruparan; Mark Rogers
备选作者
Akhgar, Babak; Staniforth, Andrew; Bosco, Francesca
备用出版商
Elsevier Science & Technology Books
备用出版商
Academic Press, Incorporated
备用出版商
Morgan Kaufmann Publishers
备用出版商
Brooks/Cole
备用出版商
MyiLibrary
备用版本
Elsevier Ltd., Waltham, Massachusetts, 2014
备用版本
United States, United States of America
备用版本
Amsterdam ; Boston, 2014
备用版本
Waltham, MA, c2014
元数据中的注释
lg3046383
元数据中的注释
{"edition":"1","isbns":["0128007435","0128008113","1306977339","9780128007433","9780128008119","9781306977333"],"last_page":306,"publisher":"Syngress","source":"libgen_rs"}
备用描述
Front Cover
Cyber Crime and Cyber Terrorism Investigator’s Handbook
Copyright
Acknowledgments
Endorsements
Contents
Contributors
Author Biography
Foreword
Preface
Chapter 1: Cyberspace: The new frontier for policing?
The Shape of the Challenge
The Size of the Challenge
The Response
Conclusion
References
Chapter 2: Definitions of Cyber Terrorism
Introduction
The Confusion About Cyber Terrorism
Cyber Terrorism Definition
Has Cyber Terrorism ever Occurred?
Conclusions
References
Chapter 3: New and emerging threats of cyber crime and terrorism
Introduction
Some Historic Milestones
Cyber security lessons not learned from previous ICT innovation cycles
Organizational aspects not learned from previous ICT innovation cycles
Emerging threats
Conclusions
References
Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes
Introduction
Investigative Decision Making
Investigative Problem Solving
Developing Investigative Hypothesis
Investigative Innovation
Investigators Contact Management
Investigating Crime and Terror
Conclusion
References
Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigations
Introduction
User Requirements and the Need for a User-Centered Approach?
Balancing Technological and Human Capabilities
Conducting User Requirements Elicitation
Capturing and Communicating User Requirements
Conclusion
Acknowledgment
References
Chapter 6: High-tech investigations of cyber crime
Introduction
High-Tech Investigations and Forensics
Core Concepts of High-Tech Investigations
Digital Landscapes
The “Crime Scene”
Live and Online Data Capture
Offline (Dead) Data Capture
Verification of the Data
Reviewing the Requirements
Starting the Analysis
Signature Analysis
Filtering Evidence
Keyword Searching
Core Evidence
Windows LNK Files
Windows Prefetch Files
Windows Event Logs
Windows Registry
Restore Points
Case Study
Summary
References
Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines
Introduction
Establishing Crime
Collecting Evidence for a Search Warrant
Reported by a Third Party
Identification of a Suspects Internet Protocol Address
IP Spoofing
Anonymizing Proxy Relay Services
Intrusion Detection Systems, Network Traffic and Firewall Logs
Interviews with Suspects
Analysis of Suspects Media
Doxing
Collecting Evidence
Seizing Equipment
Search for Written Passwords
Forensic Acquisition
Ram
Image
Forensic Analysis
Anti-forensics
RAM Analysis
Data Carving and Magic Values
Media Storage Forensics
The Structure and Format of a Hard Drive
Partitions
Master Boot Record
The VBR and BIOS parameter block
File System
File Table
Searching for Evidence
Keyword and Phrases Search
Recovering Deleted Information
Recovering Deleted Files and Folders
Recovering Deleted Partitions
Where Evidence Hides
Registry
Most Recently Used Lists
LastWrite Time
Hiberfil.sys
Pagefil.sys
System Volume Information Folders
Chapter Summary
References
Chapter 8: Digital forensics education, training and awareness
Introduction
Digital Forensics Laboratory Preparation and Training
Digital Anti Forensics Tools and Approaches
The Main Difficulties Faced by Law Enforcement Officers Fighting Cyber-Crime
Educational Provision for the Study of Computer Forensics
The CFM Methodology
Conclusions
References
Chapter 9: Understanding the situational awareness in cybercrimes: case studies
Introduction
Taxonomical Classification of Cybercrime/Cyberterrorism
Case Studies
Political/Publicity/Self-Actualization: The Case of the Syrian Electronic Army
Who Are They?
Political or Moral Hackers?
Methods: Phishing and DDoS
Who Have They Hacked to Date?
CNN
Angry Birds
Microsoft (January 2014)
Saudi Arabian Government Websites (January 2014)
Social Media Presence
The Case of Stuxnet
The Cyber-Attacks on Banks
On a Global Scale
In the UK
The Case of the Anonymous Attacks on Scientology
Self-Actualization: The Case of “Mafiaboy”
Strategic Responses to Cyber Attacks
Concluding Remarks
References
Chapter 10: Terrorist use of the internet
Terrorist Use of the Internet
Propaganda—Indoctrination—Recruitment
The Role of the Video
Online Forums—Blogs
Online Social Network Services
Radicalization Process on the Internet
Particular case: lone wolf
Information Sharing
Future Developments
Cyber Terrorism
Financing
Darknet
3D Printing
Full VPN
Conclusion
References
Chapter 11: ICT as a protection tool against child exploitation
Introduction
Key Issues and Challenges
Information Awareness and Better Education
Government Responsibilities and Legal Framework
Technical Issues and Challenges
A Case Study on Use of Technology and Proposed Methodology
Objectivity, Consistency and Credibility
A Systems Approach to Child Protection
Child-Centered Information Flows
CBCTResponse System
Conclusions
References
Chapter 12: Cybercrime classification and characteristics
Introduction
What is Cybercrime?
What are the Classifications and Types of Cybercrime?
Cybercrime Categories
Phishing
Spam
Hacking
Cyber Harassment or Bullying
Identity Theft
Plastic Card Fraud
Internet Auction Fraud
Cyber-Attack Methods and Tools
Conclusion
References
Chapter 13: Cyber terrorism: Case studies
Introduction
Case Studies—Activities In Cyberspace Attributed to Terrorist Organizations
Analysis of Capabilities
Technological Capabilities, Intelligence Guidance, and Operational Capacity
Technological Capabilities
Intelligence-Guided Capability
Operational Capability
Conclusion
References
Chapter 14: Social media and Big Data
Introduction
Big Data: The Asymmetric Distribution of Control Over Information and Possible Remedies
Big Data and Social Surveillance: Public and Private Interplay in Social Control
Array of Approved eSurveillance Legislation
Forced “On Call” Collaboration by Private Entities
Data Collection for Crime Prediction and Prevention
Legitimacy
Use of Private Sector Tools and Resources
The Role of the E.U. Reform on Data Protection in Limiting the Risks of Social Surveillance
Preserving the E.U. data protection standard in a globalized world
References
Chapter 15: Social media and its role for LEAs: Review and applications
Introduction
Features of Social Media Users and Use
Differences in Demographics Across Networks
Rationales for Social Media Use
Influences on Social Media Behaviors
Disclosure and Trustworthiness of Information
Relevance to LEAs
LEA Usage Scenarios for Social Media
Social Media in “Lone-Wolf” Scenarios for Early Assessment and Identification of Threats
Social Media-Based Approach in a Hostage Scenario
Organized Crime Social Media Data Analysis
Crowd-Sourcing with a Collective Intelligence Platform
Application of Social Media in Human Trafficking Scenarios
Public Engagement on Social Media
From Social Media to LEA Intelligence
Concluding Remarks
References
Chapter 16: The rise of cyber liability insurance
A Brief History of Insurance
Business Interruption Insurance
What is Cyber Liability?
First-Party Cyber Liability
Third-Party Cyber Liability
Cyber Risks—A Growing Concern
The Cyber Threat
A Changing Regulatory Landscape
ICO Notification
What Does Cyber Liability Insurance Cover?
Who Offers Cyber Liability Insurance and What Should Customers Look Out For?
Conclusion
Chapter 17: Responding to cyber crime and cyber terrorism—botnets an insidious threat
Introduction
A Botnet Roadmap
Primary Activities:
Support Activities:
Botnets How Do They Work. Network Topologies and Protocols
Case Study—Eurograbber (2012)
The Infection
The Money Theft
Case Study—ZeroAccess (2013)
Countermeasures for Fighting Botnets or Mitigating Botnets Effects
Conclusion and Future Trends (TOR, Mobile and Social Networks)
References
Chapter 18: Evolution of tetra through the integration with a number of communication platforms to support public protecti ...
Introduction
TETRA Technology
Current Trends of PPDR (i.e., TETRA) Technology
Technological and Economic Barriers and Issues
Progress Beyond the State-of-the-Art
Current PPDR Communication Network Architecture Landscape
State-of-the-Art on Mobile Communication Standard
General PMR standards
TETRAPOL
GSM
TETRA
Proposed PPDR Communication Network Architectural Solutions
TETRA over Mobile IP Network
Multi-technology communication mobile IP gateway (MIPGATE)
Multipath TCP
Security
TETRA over Mobile Ad-Hoc Network
TETRA over DVB-T/DTTV Network
Conclusion
References
Index
备用描述
<p><i>Cyber Crime and Cyber Terrorism Investigator’s Handbook is</i> a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.</p> <p><i>Cyber Crime and Cyber Terrorism Investigator’s Handbook</i> describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.</p> <p>Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, <i>Cyber Crime and Cyber Terrorism Investigator’s Handbook</i> will serve as your best reference to the modern world of cyber crime.</p><br><br><ul><li>Written by experts in cyber crime, digital investigations, and counter-terrorism</li><li>Learn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigators</li><li>Keep up to date on current national and international law regarding cyber crime and cyber terrorism</li><li>See just how significant cyber crime has become, and how important cyber law enforcement is in the modern world</li></ul>
开源日期
2021-07-04
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。