Book description
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.
Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.
Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator’s Handbook will serve as your best reference to the modern world of cyber crime.
- Written by experts in cyber crime, digital investigations, and counter-terrorism
- Learn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigators
- Keep up to date on current national and international law regarding cyber crime and cyber terrorism
- See just how significant cyber crime has become, and how important cyber law enforcement is in the modern world
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Acknowledgments
- Endorsements
- Contributors
- Author Biography
- Foreword
- Preface
- Chapter 1: Cyberspace: The new frontier for policing?
- Chapter 2: Definitions of Cyber Terrorism
- Chapter 3: New and emerging threats of cyber crime and terrorism
- Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes
- Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigations
- Chapter 6: High-tech investigations of cyber crime
-
Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines
- Abstract
- Introduction
- Establishing Crime
- Collecting Evidence for a Search Warrant
- Reported by a Third Party
- Identification of a Suspects Internet Protocol Address
- IP Spoofing
- Anonymizing Proxy Relay Services
- Intrusion Detection Systems, Network Traffic and Firewall Logs
- Interviews with Suspects
- Analysis of Suspects Media
- Doxing
- Collecting Evidence
- Seizing Equipment
- Search for Written Passwords
- Forensic Acquisition
- RAM
- Image
- Forensic Analysis
- Anti-forensics
- RAM Analysis
- Data Carving and Magic Values
- Media Storage Forensics
- Partitions
- Master Boot Record
- The VBR and BIOS Parameter Block
- File System
- File Table
- Searching for Evidence
- Keyword and Phrases Search
- Recovering Deleted Information
- Recovering Deleted Files and Folders
- Recovering Deleted Partitions
- Where Evidence Hides
- Registry
- Most Recently Used Lists
- LastWrite Time
- Hiberfil.sys
- Pagefil.sys
- System Volume Information Folders
- Chapter Summary
- Chapter 8: Digital forensics education, training and awareness
-
Chapter 9: Understanding the situational awareness in cybercrimes: case studies
- Abstract
- Introduction
- Taxonomical Classification of Cybercrime/Cyberterrorism
- Case Studies
- Political/Publicity/Self-Actualization: The Case of the Syrian Electronic Army
- The Case of Stuxnet
- The Cyber-Attacks on Banks
- The Case of the Anonymous Attacks on Scientology
- Self-Actualization: The Case of “Mafiaboy”
- Strategic Responses to Cyber Attacks
- Concluding Remarks
- Chapter 10: Terrorist use of the internet
- Chapter 11: ICT as a protection tool against child exploitation
- Chapter 12: Cybercrime classification and characteristics
- Chapter 13: Cyber terrorism: Case studies
-
Chapter 14: Social media and Big Data
- Abstract
- Introduction
- Big Data: The Asymmetric Distribution of Control Over Information and Possible Remedies
- Big Data and Social Surveillance: Public and Private Interplay in Social Control
- The Role of the E.U. Reform on Data Protection in Limiting the Risks of Social Surveillance
- Preserving the E.U. Data Protection Standard in a Globalized World
- Chapter 15: Social media and its role for LEAs: Review and applications
-
Chapter 16: The rise of cyber liability insurance
- Abstract
- A Brief History of Insurance
- Business Interruption Insurance
- What Is Cyber Liability?
- Cyber Risks—A Growing Concern
- The Cyber Threat
- A Changing Regulatory Landscape
- ICO Notification
- What Does Cyber Liability Insurance Cover?
- Who Offers Cyber Liability Insurance and What Should Customers Look Out For?
- Conclusion
- Chapter 17: Responding to cyber crime and cyber terrorism—botnets an insidious threat
- Chapter 18: Evolution of TETRA through the integration with a number of communication platforms to support public protection and disaster relief (PPDR)
- Index
Product information
- Title: Cyber Crime and Cyber Terrorism Investigator's Handbook
- Author(s):
- Release date: July 2014
- Publisher(s): Syngress
- ISBN: 9780128008119
You might also like
book
Cyber Crime Investigations
Written by a former NYPD cyber cop, this is the only book available that discusses the …
book
Targeted Cyber Attacks
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role …
book
Investigating Internet Crimes
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the …
book
Cybersecurity Law, 2nd Edition
The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments …