Muutke küpsiste eelistusi

E-raamat: Cybercrime and Information Technology: The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices

(University of Edinburgh, UK)
  • Formaat: 454 pages
  • Ilmumisaeg: 27-Oct-2021
  • Kirjastus: CRC Press
  • Keel: eng
  • ISBN-13: 9781000426861
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 84,49 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 454 pages
  • Ilmumisaeg: 27-Oct-2021
  • Kirjastus: CRC Press
  • Keel: eng
  • ISBN-13: 9781000426861
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

"Cybercrime and Internet Technology: Theory and Practice - The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text, outlining the fundamentals of computing devicesand network functions, core security concepts, and how devices can be used to both perpetrate and facilitate crimes. Digital evidence recovery and forensic investigation are addressed in the context of legal statutes and implications insofar as the perpetration of crimes and digital crimes in particular. Many books on the market cover investigations, or forensic recovery and presentation of evidence. Others seek to explain computer and network security. This book takes the whole of the problem after focusing on the core, essential principles governing computers, wireless devices, network and cloud systems, then understanding their vulnerabilities. Only in this way can the security challenges, and opportunity for crime, be understood to be properly uncovered, investigated, and adjudicated. The legal portion of the book examines currently legislation, statues, and both domestic and international law. This includes various cases that are currently in-process that are shaping legal precedent going forward. Case law and standards are addressed relative to the present status as well as where they are headed. Ss is often the case, new technologies require new statues and regulations-something the laws are often slow to move on given the current speed in which technology advances. Cybercrime and Internet Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach at technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes"--

Cybercrime and Information Technology strikes the proper balance of core concepts—laying the groundwork for students to understand both current and emerging security threats—while looking at next generation threats and technology solutions to collect digital evidence counter such threats.



Cybercrime and Information Technology: Theory and Practice: The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text.

While many books on the market cover investigations, forensic recovery, and presentation of evidence, and others explain computer and network security, this book explores both, explaining the essential principles governing computers, wireless and mobile devices, the Internet of Things, cloud systems, and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered, investigated, and adjudicated unless they are understood.

The legal portion of the book is an overview of the legal system in the United States, including cyberlaw standards, and regulations affecting cybercrime.

This section includes cases in progress that are shaping and developing legal precedents. As is often the case, new technologies require new statues and regulations—something the law is often slow to move on given the current speed in which technology advances.

.

Key Features:

  • Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices.
  • Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation.
  • Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things.
    • Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges.
  • Cybercrime and Information Technology

    is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum, and is relevant to those studying Security Administration, Public Administrations, Police Studies, Business Administration, Computer Science, and Information Systems.

    An Instructor’s Manual with Test Bank and PowerPoint slides is available to qualified professors for use in classroom instruction.

    Preface xv
    Acknowledgment xvii
    Author's Bio xix
    Chapter 1 Understanding Essential Computer Concepts 1(52)
    Objectives
    1(1)
    1.1 Understanding Computation
    1(2)
    Conventional Computer Systems
    1(2)
    1.2 Input
    3(12)
    Understanding Binary Data
    4(5)
    Conversion from Binary to Decimal
    9(1)
    Conversion from Decimal to Binary
    9(2)
    Hexadecimal
    11(2)
    Converting from Hexadecimal to Binary
    13(1)
    Conversion from Binary to Hexadecimal
    13(1)
    ASCII, EBCDIC and UNICODE
    14(1)
    1.3 Processing
    15(5)
    Boolean Algebra, Logic Gates, and Truth Tables
    15(4)
    Processor Types (32-bit Processors vs 64-bit Processors)
    19(1)
    1.4 Storage
    20(4)
    Compression
    21(1)
    Lossy Compression
    22(1)
    Lossless Compression
    23(1)
    1.5 Output
    24(5)
    Pixels
    24(1)
    Color Depth
    25(2)
    Color Models
    27(1)
    Screen Resolution
    28(1)
    1.6 Beyond Conventional Computing
    29(1)
    Quantum Computing Is Poised to Change Everything
    29(1)
    1.7 A Brief History of Computing Devices
    30(19)
    1.8 Conclusion
    49(2)
    1.9 Key Words
    51(2)
    Chapter 2 Cybercrime in a Data-Driven and Techno-Centric Society 53(34)
    Objectives
    53(1)
    2.1 Cybercrime and the Cybercriminal
    53(2)
    2.2 The Origin and Definition of Cybercrime - It's the Data, Always the Data
    55(3)
    2.3 Brief Summary of the Phases and Evolution of Cybercrime
    58(15)
    Phase I
    60(2)
    Phase II
    62(1)
    Phase III
    63(4)
    Phase IV
    67(6)
    2.4 Cybercrime Categories
    73(3)
    The Three Cybercrime Categories
    73(3)
    2.5 The Future of Cybercrime
    76(8)
    The Making of the Cybercriminal
    76(2)
    Cybercrime and the Internet of Things (IoT)
    78(1)
    Cybercrime: Machine Learning and Artificial Intelligence
    79(1)
    Online Child Sexual Abuse and Exploitation (CSAE)
    80(1)
    Cost of Cybercrime
    81(1)
    The Role of Cryptocurrency in Cybercrime
    81(2)
    State-Sponsored Cyberwarfare and Industrial Espionage
    83(1)
    2.6 Conclusion
    84(1)
    2.7 Key Words
    85(2)
    Chapter 3 Understanding the U.S. Legal System 87(18)
    Objectives
    87(1)
    3.1 Introduction
    87(4)
    I Jurisdiction and Extradition
    88(1)
    II Online Anonymity
    89(1)
    III Digital Evidence
    90(1)
    IV Most Cybercrimes Are not Reported
    90(1)
    3.2 A Brief Overview of the Legal System in the United States
    91(8)
    I The Constitution
    92(1)
    II Statutory or Statute Law
    93(2)
    III Administrative Laws (Agency Regulations) and Ordinance Law
    95(1)
    IV Judicial Decisions or Precedents or Case Law
    96(1)
    3.2.1 The Courts System
    96(3)
    3.3 Types of Laws
    99(3)
    3.3.1 Administrative Law
    99(1)
    3.3.2 Civil Law
    100(1)
    3.3.3 Criminal Law
    100(2)
    3.4 Conclusion
    102(2)
    3.5 Key Words
    104(1)
    Chapter 4 Laws, Standards, and Regulations Affecting Cybercrime 105(66)
    Objectives
    105(1)
    4.1 Introduction
    105(4)
    4.1.1 Current Legislative Framework in the United States
    106(3)
    4.2 Anti-Hacking Laws
    109(16)
    4.2.1 The Federal Computer Fraud and Abuse Act
    109(8)
    4.2.1.1 Key Terms and Major Cases to Understand CFAA
    112(4)
    4.2.1.2 Limitations of the CFAA
    116(1)
    4.2.2 Computer Hacking Laws from Individual States
    117(1)
    4.2.3 The Economic Espionage Act of 1996 (EEA)
    117(2)
    4.2.3.1 Important Cases
    118(1)
    4.2.4 The Digital Millennium Copyright Act
    119(6)
    4.2.4.1 Penalties for 17 U.S.C. § 1201
    122(1)
    4.2.4.2 Important Cases
    123(2)
    4.3 Data Security Laws and Regulations in the Private Sector Entities
    125(15)
    4.3.1 The National Institute of Standards and Technology Cybersecurity Framework
    126(2)
    4.3.2 Laws Dealing with Healthcare
    128(3)
    4.3.2.1 The Health Insurance Portability and Accountability Act (HIPAA)
    128(3)
    4.3.2.2 Penalties for Violating HIPAA Rule
    131(1)
    4.3.3 Health Information Technology for Economic and Clinical Health Act
    131(1)
    4.3.4 Protecting Consumers' Privacy Rights with FTC's Section 5: Federal Trade Commission Act
    132(2)
    4.3.4.1 Important FTC Cases
    133(1)
    4.3.5 Laws Affecting Financial Institutions
    134(4)
    4.3.5.1 The Gramm-Leach-Bliley Act of 1999 (GLBA)
    134(3)
    4.3.5.2 Red Flags Rule
    137(1)
    4.3.6 Laws Affecting Utilities
    138(2)
    4.3.6.1 The Federal Energy Regulatory Commission
    138(2)
    4.3.6.2 Nuclear Regulatory Commission
    140(1)
    4.4 Public and Private Sector Entities Partnerships in Cyberspace
    140(4)
    4.4.1 Cybersecurity Information Sharing Act of 2015 (CISA)
    141(1)
    4.4.2 The Cybersecurity and Infrastructure Security Agency
    142(1)
    4.4.3 The National Cybersecurity and Critical Infrastructure Protection Act of 2014 (NCPA)
    143(1)
    4.4.4 Cybersecurity Enhancement Act of 2014 (CEA)
    143(1)
    4.5 Cybersecurity Requirements for Federal Government Contractors
    144(3)
    4.5.1 Federal Information Security Modernization Act of 2014
    145(1)
    4.5.2 NIST Information Security Controls for Government Agencies and Contractors
    146(1)
    4.6 Most Important Internet Surveillance Laws in the United States
    147(10)
    4.6.1 All Writs Act
    147(1)
    4.6.1.1 Significant Case
    147(1)
    4.6.2 Fourth Amendment
    148(6)
    4.6.2.1 Search and Seizure
    149(1)
    4.6.2.2 Exceptions to the Search Warrant Rule
    150(1)
    4.6.2.3 Electronic Surveillance: Private vs Public
    151(2)
    4.6.2.4 Exclusionary Rule and the Good Faith Exception
    153(1)
    4.6.2.5 The USA PATRIOT Act and the Fourth Amendment
    153(1)
    4.6.3 Electronic Communication Privacy Act of 1986
    154(2)
    4.6.4 Communication Assistant for Law Enforcement Act of 1994 (CA LEA)
    156(1)
    4.7 Key Privacy Laws in the United States
    157(9)
    4.7.1 Privacy Act of 1974
    158(1)
    4.7.2 Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act)
    158(1)
    4.7.3 18 U.S.C. § 1037 Fraud and Related Activity in Connection with Electronic Mail
    159(1)
    4.7.4 18 U.S.C. § 1029 Fraud and Related Activity in Connection with Access Devices
    160(1)
    4.7.5 18 U.S. Code § 1028 Fraud and Related Activity in Connection with Identification Documents, Authentication Features, and Information
    161(1)
    4.7.6 Children's Online Privacy Protection Act of 1998
    162(2)
    4.7.7 Video Privacy Protection Act (VPPA) of 1988
    164(1)
    4.7.8 When the United States Began Taking Privacy Seriously
    165(1)
    4.8 Conclusion
    166(3)
    4.9 Key Words
    169(2)
    Chapter 5 The Networking Environment 171(50)
    Objectives
    171(2)
    5.1 Introduction to Computer Networking
    173(26)
    5.1.1 Protocols
    175(1)
    5.1.2 The World Wide Web and the Internet
    176(2)
    5.1.3 Advantages and Disadvantages
    178(1)
    5.1.4 Essential Computer Network Components and Terminology
    179(9)
    5.1.5 Basic Anatomy of IPv6
    188(7)
    5.1.6 Using Network Utilities
    195(4)
    5.2 Types of Networks
    199(3)
    5.3 Network Topology
    202(4)
    5.4 The Open Systems Interconnection (OSI) Model
    206(4)
    5.5 The Internet Protocol Suite (TPC/IP)
    210(6)
    5.5.1 TCP
    212(1)
    5.5.2 UDP
    213(3)
    5.6 How Everything Works Together on the Internet: A Review
    216(2)
    5.7 Conclusion
    218(1)
    5.8 Key Words
    219(2)
    Chapter 6 Computer Security Technology and Principles 221(54)
    Objectives
    221(1)
    6.1 Introduction
    221(9)
    6.2 Understanding Security Terminology
    230(5)
    6.3 Types of Cyberattacks
    235(21)
    6.3.1 Adware
    237(1)
    6.3.2 Denial-of-Service Attacks
    238(8)
    6.3.2.1 Notable DDoS Attacks
    245(1)
    6.3.2.2 DoS Attacking Tools
    245(1)
    6.3.3 Malware
    246(2)
    6.3.4 Phishing
    248(2)
    6.3.5 Spoofing
    250(1)
    6.3.6 Structured Query Language (SQL) Injection or (SQLI)
    251(1)
    6.3.7 Wi-Fi Hacking
    252(4)
    6.4 Prevention Mechanisms
    256(5)
    6.4.1 If You Connect It, Protect It
    256(3)
    6.4.2 Types of Firewalls
    259(2)
    6.5 Identification, Authentication, and Authorization
    261(1)
    6.6 Modern Encryption
    262(11)
    6.6.1 Symmetric Encryption or Secret Key Cryptography (SKC)
    263(3)
    6.6.2 Asymmetric Encryption or Public Key Cryptography or Asymmetric Cryptography
    266(3)
    6.6.3 Digital Certificates and Certificate Authority
    269(1)
    6.6.4 Hash Functions or Hashing Algorithms
    270(9)
    What Does "Salting" a Hashtag Mean?
    272(1)
    6.7 Conclusion
    273(1)
    6.8 Key Words
    274(1)
    Chapter 7 Internet of Things (IoTs) 275(32)
    Objectives
    275(1)
    7.1 The Internet of Things-An Introduction
    276(3)
    7.2 A Summary of IoT Applications
    279(7)
    7.2.1 Automotive Sector
    279(1)
    7.2.2 Energy Sector
    280(1)
    7.2.3 Healthcare Sector
    281(1)
    7.2.4 Manufacturing Sector
    282(2)
    7.2.5 Retail Sector
    284(1)
    7.2.6 Smart Structures (Buildings, Roads, and Bridges Sector)
    284(1)
    7.2.7 Smart Homes
    285(1)
    7.2.8 Transportation Sector
    286(1)
    7.3 IoT Components, Data Processing Architectures, and Protocols
    286(13)
    7.3.1 Basic Components and Data Processing
    286(2)
    7.3.2 Big Data in IoT
    288(2)
    7.3.3 Architectures
    290(3)
    7.3.4 Protocols and Standards
    293(6)
    7.4 Network Consideration for IoT Devices
    299(2)
    7.5 Security
    301(3)
    7.6 Conclusion
    304(1)
    7.7 Key Words
    304(3)
    Chapter 8 Mobile Devices: The Smartphone 307(36)
    Objectives
    307(1)
    8.1 Introduction
    307(1)
    8.2 A Brief History and Significant Milestones of Mobile Phones
    308(5)
    8.3 Components, Operating Systems (OS), Applications and Architecture
    313(9)
    8.3.1 Main Components
    313(3)
    8.3.2 Operating Systems (OS) and Applications (apps)
    316(1)
    8.3.3 Platform Architectures
    317(5)
    8.4 The Cellular Network
    322(10)
    8.4.1 What Happens When a Mobile Phone Is Turned On?
    325(3)
    8.4.2 The Cell Tower or Cellular Base Station
    328(1)
    8.4.3 Mobile Device Tracking Location: Cell Towers, GPS, and Indoor Localization
    329(3)
    8.5 Security
    332(6)
    8.5.1 Physical Security
    333(2)
    8.5.2 Executable Security
    335(3)
    8.6 Conclusion
    338(2)
    8.7 Key Words
    340(3)
    Appendix A: A Complete Text of the Computer Fraud and Abuse Act (CFAA) 18 U.S.C. § 1030 343(16)
    Appendix B: 17 U.S.C. § 1201 Circumvention of Copyright Protection Systems 359(18)
    Appendix C: HIPAA §164.308 Administrative Safeguards 377(8)
    Appendix D 385(6)
    Appendix E: 15 U.S.C. 391(10)
    Appendix F 401(4)
    Appendix G 405(6)
    Appendix H 411(4)
    Appendix I: Valuable IT and Management Certifications 415(4)
    Index 419
    Dr. Alex Alexandrou is an Assistant Professor at the Department of Security, Fire, and Emergency Management at John Jay College. He received his doctoral degree in computing studies from Pace University. Since 2005, he has been teaching computer and health informatics and telehealth courses at Pace University and the Fashion Institute of Technology (FIT). He has also produced and directed twelve episodes of a PBS talk show broadcasted on WNET, WNYC and CUNY-TV.

    Dr. Alexandrou has worked extensively in both business and academic environments. He has over 18 years of professional experience in healthcare IT, including software integration, biometric and access control systems, deploying virtualization by transitioned use of physical servers into virtualization technology, realigning IT architecture with cloud-based networks and security platforms/technologies.

    In addition, he has worked extensively with Agile/Scrum methodologies used for managing projects and software development and ensuring compliance with legal regulations such as the Health Insurance Portability and Accountability Act (HIPPA) and the Health Information Technology for Economic and Clinical Health (HITECK) Act.

    Academically, he has conducted research studies on biometric authentication, electronic medical records, and mobile devices security and perception in the healthcare environment.

    His current research interests include mobile forensics investigation, mobile devices vulnerabilities and threats, wireless networking and wireless vulnerabilities and exploits, security and privacy.