Preface |
|
xv | |
Acknowledgment |
|
xvii | |
Author's Bio |
|
xix | |
Chapter 1 Understanding Essential Computer Concepts |
|
1 | (52) |
|
|
1 | (1) |
|
1.1 Understanding Computation |
|
|
1 | (2) |
|
Conventional Computer Systems |
|
|
1 | (2) |
|
|
3 | (12) |
|
Understanding Binary Data |
|
|
4 | (5) |
|
Conversion from Binary to Decimal |
|
|
9 | (1) |
|
Conversion from Decimal to Binary |
|
|
9 | (2) |
|
|
11 | (2) |
|
Converting from Hexadecimal to Binary |
|
|
13 | (1) |
|
Conversion from Binary to Hexadecimal |
|
|
13 | (1) |
|
ASCII, EBCDIC and UNICODE |
|
|
14 | (1) |
|
|
15 | (5) |
|
Boolean Algebra, Logic Gates, and Truth Tables |
|
|
15 | (4) |
|
Processor Types (32-bit Processors vs 64-bit Processors) |
|
|
19 | (1) |
|
|
20 | (4) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (5) |
|
|
24 | (1) |
|
|
25 | (2) |
|
|
27 | (1) |
|
|
28 | (1) |
|
1.6 Beyond Conventional Computing |
|
|
29 | (1) |
|
Quantum Computing Is Poised to Change Everything |
|
|
29 | (1) |
|
1.7 A Brief History of Computing Devices |
|
|
30 | (19) |
|
|
49 | (2) |
|
|
51 | (2) |
Chapter 2 Cybercrime in a Data-Driven and Techno-Centric Society |
|
53 | (34) |
|
|
53 | (1) |
|
2.1 Cybercrime and the Cybercriminal |
|
|
53 | (2) |
|
2.2 The Origin and Definition of Cybercrime - It's the Data, Always the Data |
|
|
55 | (3) |
|
2.3 Brief Summary of the Phases and Evolution of Cybercrime |
|
|
58 | (15) |
|
|
60 | (2) |
|
|
62 | (1) |
|
|
63 | (4) |
|
|
67 | (6) |
|
2.4 Cybercrime Categories |
|
|
73 | (3) |
|
The Three Cybercrime Categories |
|
|
73 | (3) |
|
2.5 The Future of Cybercrime |
|
|
76 | (8) |
|
The Making of the Cybercriminal |
|
|
76 | (2) |
|
Cybercrime and the Internet of Things (IoT) |
|
|
78 | (1) |
|
Cybercrime: Machine Learning and Artificial Intelligence |
|
|
79 | (1) |
|
Online Child Sexual Abuse and Exploitation (CSAE) |
|
|
80 | (1) |
|
|
81 | (1) |
|
The Role of Cryptocurrency in Cybercrime |
|
|
81 | (2) |
|
State-Sponsored Cyberwarfare and Industrial Espionage |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (2) |
Chapter 3 Understanding the U.S. Legal System |
|
87 | (18) |
|
|
87 | (1) |
|
|
87 | (4) |
|
I Jurisdiction and Extradition |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
IV Most Cybercrimes Are not Reported |
|
|
90 | (1) |
|
3.2 A Brief Overview of the Legal System in the United States |
|
|
91 | (8) |
|
|
92 | (1) |
|
II Statutory or Statute Law |
|
|
93 | (2) |
|
III Administrative Laws (Agency Regulations) and Ordinance Law |
|
|
95 | (1) |
|
IV Judicial Decisions or Precedents or Case Law |
|
|
96 | (1) |
|
|
96 | (3) |
|
|
99 | (3) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (2) |
|
|
102 | (2) |
|
|
104 | (1) |
Chapter 4 Laws, Standards, and Regulations Affecting Cybercrime |
|
105 | (66) |
|
|
105 | (1) |
|
|
105 | (4) |
|
4.1.1 Current Legislative Framework in the United States |
|
|
106 | (3) |
|
|
109 | (16) |
|
4.2.1 The Federal Computer Fraud and Abuse Act |
|
|
109 | (8) |
|
4.2.1.1 Key Terms and Major Cases to Understand CFAA |
|
|
112 | (4) |
|
4.2.1.2 Limitations of the CFAA |
|
|
116 | (1) |
|
4.2.2 Computer Hacking Laws from Individual States |
|
|
117 | (1) |
|
4.2.3 The Economic Espionage Act of 1996 (EEA) |
|
|
117 | (2) |
|
|
118 | (1) |
|
4.2.4 The Digital Millennium Copyright Act |
|
|
119 | (6) |
|
4.2.4.1 Penalties for 17 U.S.C. §1201 |
|
|
122 | (1) |
|
|
123 | (2) |
|
4.3 Data Security Laws and Regulations in the Private Sector Entities |
|
|
125 | (15) |
|
4.3.1 The National Institute of Standards and Technology Cybersecurity Framework |
|
|
126 | (2) |
|
4.3.2 Laws Dealing with Healthcare |
|
|
128 | (3) |
|
4.3.2.1 The Health Insurance Portability and Accountability Act (HIPAA) |
|
|
128 | (3) |
|
4.3.2.2 Penalties for Violating HIPAA Rule |
|
|
131 | (1) |
|
4.3.3 Health Information Technology for Economic and Clinical Health Act |
|
|
131 | (1) |
|
4.3.4 Protecting Consumers' Privacy Rights with FTC's Section 5: Federal Trade Commission Act |
|
|
132 | (2) |
|
4.3.4.1 Important FTC Cases |
|
|
133 | (1) |
|
4.3.5 Laws Affecting Financial Institutions |
|
|
134 | (4) |
|
4.3.5.1 The Gramm-Leach-Bliley Act of 1999 (GLBA) |
|
|
134 | (3) |
|
|
137 | (1) |
|
4.3.6 Laws Affecting Utilities |
|
|
138 | (2) |
|
4.3.6.1 The Federal Energy Regulatory Commission |
|
|
138 | (2) |
|
4.3.6.2 Nuclear Regulatory Commission |
|
|
140 | (1) |
|
4.4 Public and Private Sector Entities Partnerships in Cyberspace |
|
|
140 | (4) |
|
4.4.1 Cybersecurity Information Sharing Act of 2015 (LISA) |
|
|
141 | (1) |
|
4.4.2 The Cybersecurity and Infrastructure Security Agency |
|
|
142 | (1) |
|
4.4.3 The National Cybersecurity and Critical Infrastructure Protection Act of 2014 (NCPA) |
|
|
143 | (1) |
|
4.4.4 Cybersecurity Enhancement Act of 2014 (CEA) |
|
|
143 | (1) |
|
4.5 Cybersecurity Requirements for Federal Government Contractors |
|
|
144 | (3) |
|
4.5.1 Federal Information Security Modernization Act of 2014 |
|
|
145 | (1) |
|
4.5.2 NIST Information Security Controls for Government Agencies and Contractors |
|
|
146 | (1) |
|
4.6 Most Important Internet Surveillance Laws in the United States |
|
|
147 | (10) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (6) |
|
4.6.2.1 Search and Seizure |
|
|
149 | (1) |
|
4.6.2.2 Exceptions to the Search Warrant Rule |
|
|
150 | (1) |
|
4.6.2.3 Electronic Surveillance: Private vs Public |
|
|
151 | (2) |
|
4.6.2.4 Exclusionary Rule and the Good Faith Exception |
|
|
153 | (1) |
|
4.6.2.5 The USA PATRIOT Act and the Fourth Amendment |
|
|
153 | (1) |
|
4.6.3 Electronic Communication Privacy Act of 1986 |
|
|
154 | (2) |
|
4.6.4 Communication Assistant for Law Enforcement Act of 1994 (CALEA) |
|
|
156 | (1) |
|
4.7 Key Privacy Laws in the United States |
|
|
157 | (9) |
|
4.7.1 Privacy Act of 1974 |
|
|
158 | (1) |
|
4.7.2 Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act) |
|
|
158 | (1) |
|
4.7.3 18 U.S.C. §1037 Fraud and Related Activity in Connection with Electronic Mail |
|
|
159 | (1) |
|
4.7.4 18 U.S.C. §1029 Fraud and Related Activity in Connection with Access Devices |
|
|
160 | (1) |
|
4.7.5 18 U.S. Code §1028 Fraud and Related Activity in Connection with Identification Documents, Authentication Features, and Information |
|
|
161 | (1) |
|
4.7.6 Children's Online Privacy Protection Act of 1998 |
|
|
162 | (2) |
|
4.7.7 Video Privacy Protection Act (VPPA) of 1988 |
|
|
164 | (1) |
|
4.7.8 When the United States Began Taking Privacy Seriously |
|
|
165 | (1) |
|
|
166 | (3) |
|
|
169 | (2) |
Chapter 5 The Networking Environment |
|
171 | (50) |
|
|
171 | (2) |
|
5.1 Introduction to Computer Networking |
|
|
173 | (26) |
|
|
175 | (1) |
|
5.1.2 The World Wide Web and the Internet |
|
|
176 | (2) |
|
5.1.3 Advantages and Disadvantages |
|
|
178 | (1) |
|
5.1.4 Essential Computer Network Components and Terminology |
|
|
179 | (9) |
|
5.1.5 Basic Anatomy of IPv6 |
|
|
188 | (7) |
|
5.1.6 Using Network Utilities |
|
|
195 | (4) |
|
|
199 | (3) |
|
|
202 | (4) |
|
5.4 The Open Systems Interconnection (OSI) Model |
|
|
206 | (4) |
|
5.5 The Internet Protocol Suite (TPC/IP) |
|
|
210 | (6) |
|
|
212 | (1) |
|
|
213 | (3) |
|
5.6 How Everything Works Together on the Internet: A Review |
|
|
216 | (2) |
|
|
218 | (1) |
|
|
219 | (2) |
Chapter 6 Computer Security Technology and Principles |
|
221 | (54) |
|
|
221 | (1) |
|
|
221 | (9) |
|
6.2 Understanding Security Terminology |
|
|
230 | (5) |
|
6.3 Types of Cyberattacks |
|
|
235 | (21) |
|
|
237 | (1) |
|
6.3.2 Denial-of-Service Attacks |
|
|
238 | (8) |
|
6.3.2.1 Notable DDoS Attacks |
|
|
245 | (1) |
|
6.3.2.2 DoS Attacking Tools |
|
|
245 | (1) |
|
|
246 | (2) |
|
|
248 | (2) |
|
|
250 | (1) |
|
6.3.6 Structured Query Language (SQL) Injection or (SQLI) |
|
|
251 | (1) |
|
|
252 | (4) |
|
6.4 Prevention Mechanisms |
|
|
256 | (5) |
|
6.4.1 If You Connect It, Protect It |
|
|
256 | (3) |
|
|
259 | (2) |
|
6.5 Identification, Authentication, and Authorization |
|
|
261 | (1) |
|
|
262 | (11) |
|
6.6.1 Symmetric Encryption or Secret Key Cryptography (SKC) |
|
|
263 | (3) |
|
6.6.2 Asymmetric Encryption or Public Key Cryptography or Asymmetric Cryptography |
|
|
266 | (3) |
|
6.6.3 Digital Certificates and Certificate Authority |
|
|
269 | (1) |
|
6.6.4 Hash Functions or Hashing Algorithms |
|
|
270 | (9) |
|
What Does "Salting" a Hashtag Mean? |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
274 | (1) |
Chapter 7 Internet of Things (IoTs) |
|
275 | (32) |
|
|
275 | (1) |
|
7.1 The Internet of Things-An Introduction |
|
|
276 | (3) |
|
7.2 A Summary of IoT Applications |
|
|
279 | (7) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
7.2.4 Manufacturing Sector |
|
|
282 | (2) |
|
|
284 | (1) |
|
7.2.6 Smart Structures (Buildings, Roads, and Bridges Sector) |
|
|
284 | (1) |
|
|
285 | (1) |
|
7.2.8 Transportation Sector |
|
|
286 | (1) |
|
7.3 IoT Components, Data Processing Architectures, and Protocols |
|
|
286 | (13) |
|
7.3.1 Basic Components and Data Processing |
|
|
286 | (2) |
|
|
288 | (2) |
|
|
290 | (3) |
|
7.3.4 Protocols and Standards |
|
|
293 | (6) |
|
7.4 Network Consideration for IoT Devices |
|
|
299 | (2) |
|
|
301 | (3) |
|
|
304 | (1) |
|
|
304 | (3) |
Chapter 8 Mobile Devices: The Smartphone |
|
307 | (36) |
|
|
307 | (1) |
|
|
307 | (1) |
|
8.2 A Brief History and Significant Milestones of Mobile Phones |
|
|
308 | (5) |
|
8.3 Components, Operating Systems (OS), Applications and Architecture |
|
|
313 | (9) |
|
|
313 | (3) |
|
8.3.2 Operating Systems (OS) and Applications (apps) |
|
|
316 | (1) |
|
8.3.3 Platform Architectures |
|
|
317 | (5) |
|
|
322 | (10) |
|
8.4.1 What Happens When a Mobile Phone Is Turned On? |
|
|
325 | (3) |
|
8.4.2 The Cell Tower or Cellular Base Station |
|
|
328 | (1) |
|
8.4.3 Mobile Device Tracking Location: Cell Towers, GPS, and Indoor Localization |
|
|
329 | (3) |
|
|
332 | (6) |
|
|
333 | (2) |
|
8.5.2 Executable Security |
|
|
335 | (3) |
|
|
338 | (2) |
|
|
340 | (3) |
Appendix A: A Complete Text of the Computer Fraud and Abuse Act (CFAA) 18 U.S.C. § 1030 |
|
343 | (16) |
Appendix B: 17 U.S.C. § 1201 Circumvention of Copyright Protection Systems |
|
359 | (18) |
Appendix C: HIPAA §164.308 Administrative Safeguards |
|
377 | (8) |
Appendix D |
|
385 | (6) |
Appendix E: 15 U.S.C. |
|
391 | (10) |
Appendix F |
|
401 | (4) |
Appendix G |
|
405 | (6) |
Appendix H |
|
411 | (4) |
Appendix I: Valuable IT and Management Certifications |
|
415 | (4) |
Index |
|
419 | |