Scene of the cybercrime

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of ""Scene of...

Descripción completa

Detalles Bibliográficos
Autor principal: Cross, Michael, 1965- (-)
Otros Autores: Shinder, Debra Littlejohn
Formato: Libro electrónico
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub c2008.
Edición:2nd ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627488506719
Tabla de Contenidos:
  • Front Cover; Scene of the Cybercrime Second Edition; Copyright Page; Author; Author of First Edition; Contents; Chapter 1: Facing the Cybercrime Problem Head-On; Introduction; Defining Cybercrime; Understanding the Importance of Jurisdictional Issues; Quantifying Cybercrime; Differentiating Crimes That Use the Net from Crimes That Depend on the Net; Working toward a Standard Definition of Cybercrime; Categorizing Cybercrime; Collecting Statistical Data on Cybercrime; Developing Categories of Cybercrimes; Prioritizing Cybercrime Enforcement; Reasons for Cybercrimes; Fighting Cybercrime
  • Determining Who Will Fight CybercrimeEducating Cybercrime Fighters; Getting Creative in the Fight against Cybercrime; Summary; Frequently Asked Questions; Chapter 2: The Evolution of Cybercrime; Introduction; Exploring Criminality in the Days of Stand-Alone Computers; Sharing More Than Time; The Evolution of a Word; Understanding Early Phreakers, Hackers, and Crackers; Hacking Ma Bell's Phone Network; Living on the LAN: Early Computer Network Hackers; How BBSes Fostered Criminal Behavior; How Online Services Made Cybercrime Easy; Introducing the ARPANET: The Wild West of Networking
  • Sputnik Inspires ARPAARPA Turns Its Talents to Computer Technology; Network Applications Come into Their Own; The Internetwork Continues to Expand; Watching Crime Rise with the Commercialization of the Internet; Bringing the Cybercrime Story Up-to-Date; Understanding How New Technologies Create New Vulnerabilities; Looking to the Future; Changes in Policing; Planning for the Future: How to Thwart Tomorrow's Cybercriminal; Summary; Frequently Asked Questions; Chapter 3: Understanding the People on the Scene; Introduction; Understanding Cybercriminals; Profiling Cybercriminals
  • Categorizing CybercriminalsUnderstanding Cybervictims; Categorizing Victims of Cybercrime; Making the Victim Part of the Crime-Fighting Team; Understanding Cyberinvestigators; Recognizing the Characteristics of a Good Cyberinvestigator; Categorizing Cyberinvestigators by Skill Set; Recruiting and Training Cyberinvestigators; Facilitating Cooperation: CEOs on the Scene; Summary; Frequently Asked Questions; Chapter 4: Understanding the Technology; Introduction; Understanding Computer Hardware; Looking Inside the Machine; Storage Media; Digital Media Devices
  • Understanding Why These Technical Details Matter to the InvestigatorThe Language of the Machine; Wandering through a World of Numbers; Understanding the Binary Numbering System; Encoding Nontext Files; Understanding Why These Technical Details Matter to the Investigator; Understanding Computer Operating Systems; Understanding the Role of the Operating System Software; Differentiating between Multitasking and Multiprocessing Types; Differentiating between Proprietary and Open Source Operating Systems; An Overview of Commonly Used Operating Systems; File Systems; Understanding Network Basics
  • Network Operating Systems