European Parliament Library

Cybercrime and information technology, theory and practice - the computer network infrastructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices, Alex Alexandrou

Label
Cybercrime and information technology, theory and practice - the computer network infrastructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices, Alex Alexandrou
Language
eng
Bibliography note
Includes bibliographical references and index
Illustrations
illustrations
Index
index present
Literary Form
non fiction
Main title
Cybercrime and information technology
Nature of contents
dictionariesbibliography
Oclc number
1273976397
Responsibility statement
Alex Alexandrou
Sub title
theory and practice - the computer network infrastructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices
Summary
Cybercrime and Information Technology: Theory and Practice--The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues. While many books on the market cover investigations, forensic recovery, and presentation of evidence, and others explain computer and network security, this book explores both, explaining the essential principles governing computers, wireless and mobile devices, the Internet of Things, cloud systems, and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered, investigated, and adjudicated unless they are understood. The legal portion of the book is an overview of the legal system in the United States, including cyberlaw standards, and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case, new technologies require new statues and regulations--something the law is often slow to move on given the current speed in which technology advances. Key Features: Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices. Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation. Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things. Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges. Cybercrime and Information Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum, and is relevant to those studying Security Administration, Public Administrations, Police Studies, Business Administration, Computer Science, and Information Systems. An Instructor's Manual with Test Bank and chapter PowerPoint slides is available to qualified professors for use in classroom instruction
Table Of Contents
Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Acknowledgment -- Author's Bio -- Chapter 1 Understanding Essential Computer Concepts -- Objectives -- 1.1 Understanding Computation -- Conventional Computer Systems -- 1.2 Input -- Understanding Binary Data -- Conversion from Binary to Decimal -- Conversion from Decimal to Binary -- Hexadecimal -- Converting from Hexadecimal to Binary -- Conversion from Binary to Hexadecimal -- ASCII, EBCDIC and UNICODE -- 1.3 Processing -- Boolean Algebra, Logic Gates, and Truth Tables -- Processor Types (32-bit Processors vs 64-bit Processors) -- 1.4 Storage -- Compression -- Lossy Compression -- Lossless Compression -- 1.5 Output -- Pixels -- Color Depth -- Color Models -- Screen Resolution -- 1.6 Beyond Conventional Computing -- Quantum Computing Is Poised to Change Everything -- 1.7 A Brief History of Computing Devices -- 1.8 Conclusion -- 1.9 Key Words -- Chapter 2 Cybercrime in a Data-Driven and Techno-Centric Society -- Objectives -- 2.1 Cybercrime and the Cybercriminal -- 2.2 The Origin and Definition of Cybercrime - It's the Data, Always the Data -- 2.3 Brief Summary of the Phases and Evolution of Cybercrime -- Phase I -- Phase II -- Phase III -- Phase IV -- 2.4 Cybercrime Categories -- The Three Cybercrime Categories -- 2.5 The Future of Cybercrime -- The Making of the Cybercriminal -- Cybercrime and the Internet of Things (IoT) -- Cybercrime: Machine Learning and Artificial Intelligence -- Online Child Sexual Abuse and Exploitation (CSAE) -- Cost of Cybercrime -- The Role of Cryptocurrency in Cybercrime -- State-Sponsored Cyberwarfare and Industrial Espionage -- 2.6 Conclusion -- 2.7 Key Words -- Chapter 3 Understanding the U.S. Legal System -- Objectives -- 3.1 Introduction -- I. Jurisdiction and Extradition -- II. Online Anonymity -- III. Digital EvidenceIV. Most Cybercrimes Are not Reported -- 3.2 A Brief Overview of the Legal System in the United States -- I. The Constitution -- II. Statutory or Statute Law -- III. Administrative Laws (Agency Regulations) and Ordinance Law -- IV. Judicial Decisions or Precedents or Case Law -- 3.2.1 The Courts System -- 3.3 Types of Laws -- 3.3.1 Administrative Law -- 3.3.2 Civil Law -- 3.3.3 Criminal Law -- 3.4 Conclusion -- 3.5 Key Words -- Chapter 4 Laws, Standards, and Regulations Affecting Cybercrime -- Objectives -- 4.1 Introduction -- 4.1.1 Current Legislative Framework in the United States -- 4.2 Anti-Hacking Laws -- 4.2.1 The Federal Computer Fraud and Abuse Act -- 4.2.1.1 Key Terms and Major Cases to Understand CFAA -- 4.2.1.2 Limitations of the CFAA -- 4.2.2 Computer Hacking Laws from Individual States -- 4.2.3 The Economic Espionage Act of 1996 (EEA) -- 4.2.3.1 Important Cases -- 4.2.4 The Digital Millennium Copyright Act -- 4.2.4.1 Penalties for 17 U.S.C. 1201 -- 4.2.4.2 Important Cases -- 4.3 Data Security Laws and Regulations in the Private Sector Entities -- 4.3.1 The National Institute of Standards and Technology Cybersecurity Framework -- 4.3.2 Laws Dealing with Healthcare -- 4.3.2.1 The Health Insurance Portability and Accountability Act (HIPAA) -- 4.3.2.2 Penalties for Violating HIPAA Rule -- 4.3.3 Health Information Technology for Economic and Clinical Health Act -- 4.3.4 Protecting Consumers' Privacy Rights with FTC's Section 5: Federal Trade Commission Act -- 4.3.4.1 Important FTC Cases -- 4.3.5 Laws Affecting Financial Institutions -- 4.3.5.1 The Gramm-Leach-Bliley Act of 1999 (GLBA) -- 4.3.5.2 Red Flags Rule -- 4.3.6 Laws Affecting Utilities -- 4.3.6.1 The Federal Energy Regulatory Commission -- 4.3.6.2 Nuclear Regulatory Commission -- 4.4 Public and Private Sector Entities Partnerships in Cyberspace4.4.1 Cybersecurity Information Sharing Act of 2015 (CISA) -- 4.4.2 The Cybersecurity and Infrastructure Security Agency -- 4.4.3 The National Cybersecurity and Critical Infrastructure Protection Act of 2014 (NCPA) -- 4.4.4 Cybersecurity Enhancement Act of 2014 (CEA) -- 4.5 Cybersecurity Requirements for Federal Government Contractors -- 4.5.1 Federal Information Security Modernization Act of 2014 -- 4.5.2 NIST Information Security Controls for Government Agencies and Contractors -- 4.6 Most Important Internet Surveillance Laws in the United States -- 4.6.1 All Writs Act -- 4.6.1.1 Significant Case -- 4.6.2 Fourth Amendment -- 4.6.2.1 Search and Seizure -- 4.6.2.2 Exceptions to the Search Warrant Rule -- 4.6.2.3 Electronic Surveillance: Private vs Public -- 4.6.2.4 Exclusionary Rule and the Good Faith Exception -- 4.6.2.5 The USA PATRIOT Act and the Fourth Amendment -- 4.6.3 Electronic Communication Privacy Act of 1986 -- 4.6.4 Communication Assistant for Law Enforcement Act of 1994 (CALEA) -- 4.7 Key Privacy Laws in the United States -- 4.7.1 Privacy Act of 1974 -- 4.7.2 Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act) -- 4.7.3 18 U.S.C.  1037 Fraud and Related Activity in Connection with Electronic Mail -- 4.7.4 18 U.S.C.  1029 Fraud and Related Activity in Connection with Access Devices -- 4.7.5 18 U.S. Code 1028 Fraud and Related Activity in Connection with Identification Documents, Authentication Features, and Information -- 4.7.6 Children's Online Privacy Protection Act of 1998 -- 4.7.7 Video Privacy Protection Act (VPPA) of 1988 -- 4.7.8 When the United States Began Taking Privacy Seriously -- 4.8 Conclusion -- 4.9 Key Words -- Chapter 5 The Networking Environment -- Objectives -- 5.1 Introduction to Computer Networking -- 5.1.1 Protocols -- 5.1.2 The World Wide Web and the Internet5.1.3 Advantages and Disadvantages -- 5.1.4 Essential Computer Network Components and Terminology -- 5.1.5 Basic Anatomy of IPv6 -- 5.1.6 Using Network Utilities -- 5.2 Types of Networks -- 5.3 Network Topology -- 5.4 The Open Systems Interconnection (OSI) Model -- 5.5 The Internet Protocol Suite (TPC/IP) -- 5.5.1 TCP -- 5.5.2 UDP -- 5.6 How Everything Works Together on the Internet: A Review -- 5.7 Conclusion -- 5.8 Key Words -- Chapter 6 Computer Security Technology and Principles -- Objectives -- 6.1 Introduction -- 6.2 Understanding Security Terminology -- 6.3 Types of Cyberattacks -- 6.3.1 Adware -- 6.3.2 Denial-of-Service Attacks -- 6.3.2.1 Notable DDoS Attacks -- 6.3.2.2 DoS Attacking Tools -- 6.3.3 Malware -- 6.3.4 Phishing -- 6.3.5 Spoofing -- 6.3.6 Structured Query Language (SQL) Injection or (SQLI) -- 6.3.7 Wi-Fi Hacking -- 6.4 Prevention Mechanisms -- 6.4.1 If You Connect It, Protect It -- 6.4.2 Types of Firewalls -- 6.5 Identification, Authentication, and Authorization -- 6.6 Modern Encryption -- 6.6.1 Symmetric Encryption or Secret Key Cryptography (SKC) -- 6.6.2 Asymmetric Encryption or Public Key Cryptography or Asymmetric Cryptography -- 6.6.3 Digital Certificates and Certificate Authority -- 6.6.4 Hash Functions or Hashing Algorithms -- What Does "Salting" a Hashtag Mean? -- 6.7 Conclusion -- 6.8 Key Words -- Chapter 7 Internet of Things (IoTs) -- Objectives -- 7.1 The Internet of Things-An Introduction -- 7.2 A Summary of IoT Applications -- 7.2.1 Automotive Sector -- 7.2.2 Energy Sector -- 7.2.3 Healthcare Sector -- 7.2.4 Manufacturing Sector -- 7.2.5 Retail Sector -- 7.2.6 Smart Structures (Buildings, Roads, and Bridges Sector) -- 7.2.7 Smart Homes -- 7.2.8 Transportation Sector -- 7.3 IoT Components, Data Processing Architectures, and Protocols -- 7.3.1 Basic Components and Data Processing -- 7.3.2 Big Data in IoT7.3.3 Architectures -- 7.3.4 Protocols and Standards -- 7.4 Network Consideration for IoT Devices -- 7.5 Security -- 7.6 Conclusion -- 7.7 Key Words -- Chapter 8 Mobile Devices: The Smartphone -- Objectives -- 8.1 Introduction -- 8.2 A Brief History and Significant Milestones of Mobile Phones -- 8.3 Components, Operating Systems (OS), Applications and Architecture -- 8.3.1 Main Components -- 8.3.2 Operating Systems (OS) and Applications (apps) -- 8.3.3 Platform Architectures -- 8.4 The Cellular Network -- 8.4.1 What Happens When a Mobile Phone Is Turned On? -- 8.4.2 The Cell Tower or Cellular Base Station -- 8.4.3 Mobile Device Tracking Location: Cell Towers, GPS, and Indoor Localization -- 8.5 Security -- 8.5.1 Physical Security -- 8.5.2 Executable Security -- 8.6 Conclusion -- 8.7 Key Words -- Appendix A: A Complete Text of the Computer Fraud and Abuse Act (CFAA) 18 U.S.C. 1030. -- Appendix B: 17 U.S.C. 1201 Circumvention of Copyright Protection Systems -- Appendix C: HIPAA 164.308 Administrative Safeguards -- Appendix D -- Appendix E: 15 U.S.C. -- Appendix F -- Appendix G -- Appendix H -- Appendix I: Valuable IT and Management Certifications -- Index
Classification
Content
Mapped to