책 이미지
책 정보
· 분류 : 외국도서 > 인문/사회 > 사회과학 > 범죄학
· ISBN : 9781032053851
· 쪽수 : 454쪽
· 출판일 : 2021-10-28
목차
Preface Acknowledgement Author’s Bio Chapter 1 Understanding Essential Computer Concepts. Understanding Computation Input Understanding Binary Data Conversion from Binary to Decimal Conversion from Decimal to Binary Hexadecimal Converting from Hexadecimal to Binary Conversion from Binary to Hexadecimal ASCII, EBCDIC & UNICODE Processing (Boolean Algebra, Logic Gates, Truth Tables) Processor Types (32-bit processors vs. 64-bit processors) Storage Compression (Lossy and Lossless Compression) Output Pixels Color depth Color models Screen resolution Beyond Conventional Computing Quantum Computing is Poised to Change Everything A Brief History of Computing Devices Conclusion Key words Chapter 2 Cybercrime in a Data-Driven and Techno-Centric Society Cybercrime and the Cybercriminal The Origin and Definition of Cybercrime ? It’s the Data, always the Data Brief Summary of the Phases and Evolution of Cybercrime Phase I Phase II Phase III Phase IV Cybercrime Categories The three Cybercrime Categories The future of Cybercrime The making of the Cybercriminal Cybercrime and The Internet of Things (IoT) Cybercrime: Machine Learning & Artificial Intelligence Online Child Sexual Abuse and Exploitation (CSAE) Cost of Cybercrime The Role of Cryptocurrency in Cybercrime State-Sponsored Cyberwarfare and Industrial Espionage Conclusion Key words Chapter 3 Understanding the US Legal System Introduction Jurisdiction and Extradition Online anonymity Digital evidence Most Cybercrimes are not reported A brief overview of the Legal system in the United States The Constitution Statutory or Statute Law Administrative laws (agency regulations) and Ordinance Law Judicial decisions or Precedents or Case law The Courts system Types of Laws Administrative law Civil law Criminal law Conclusion Key words Chapter 4 Laws, standards and regulations affecting Cybercrime Introduction Current Legislative Framework in the U.S. Anti-Hacking Laws The Federal Computer Fraud and Abuse Act (CFAA) Key terms and major cases to understand CFAA Limitations of the CFAA Computer Hacking Laws from individual states The Economic Espionage Act Of 1996 (EEA) The Digital Millennium Copyright Act (DMCA) Data Security Laws and Regulations in the Private Sector Entities The National Institute of Standards and Technology (NIST) Cybersecurity Framework The Health Insurance Portability and Accountability Act (HIPAA) Health Information Technology for Economic and Clinical Health Act (HITECH) Federal Trade Commission Act The Gramm-Leach-Bliley Act of 1999 (GLBA) Red Flags Rule The Federal Energy Regulatory Commission (FERC) Nuclear Regulatory Commission (NRC) Public & Private Sector Entities Partnerships in Cyberspace Cybersecurity Information Sharing Act of 2015 (CISA) The Cybersecurity and Infrastructure Security Agency (CISA) The National Cybersecurity and Critical Infrastructure Protection Act of 2014 (NCPA) Cybersecurity Enhancement Act of 2014 (CEA) Cybersecurity Requirements for Federal Government Contractors Federal Information Security Modernization Act of 2014 NIST Information Security controls for Government Agencies and Contractors Most Important Internet Surveillance Laws in the U.S. All Writs Act Fourth Amendment Search and Seizure Exceptions to the search warrant rule Electronic Surveillance: private vs public Exclusionary Rule and the Good Faith Exception The USA Patriot Act and the Fourth Amendment Electronic Communication Privacy Act (ECPA) of 1986 Communication Assistant for Law enforcement Act of 1994 (CALEA) Key Privacy Laws in the U.S. Privacy Act of 1974 The Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act) 18 U.S.C. §?1037. Fraud and Related Activity in Connection with Electronic Mail U.S.C. §?1029 Fraud and Related Activity in Connection with Access Devices 18 U.S. Code §?1028 Fraud and related activity in connection with identification documents, authentication features, and information Children’s Online Privacy Protection Act of 1998 (COPPA) Video Privacy Protection Act (VPPA) of 1988 When U.S. began taking privacy seriously Conclusion Key words Chapter 5 The Networking Environment Introduction to Computer Networking Protocols The World Wide Web and the Internet Essential Computer Network Components and Terminology Types of Networks Network Topology The Open Systems Interconnection (OSI) model The Internet protocol Suite (TPC/IP) TCP UDP How everything works together on the Internet: a Review Conclusion Key words Chapter 6 Computer Security Technology and Principles Introduction The CIA Triad model Understanding Security terminology Types of Cyber-attacks Adware Denial of service attacks Phishing Spoofing Structured Query Language (SQL) Injection or (SQLI) Wi-Fi Hacking Prevention Mechanisms Types of firewalls Identification, Authentication, and Authorization Modern Encryption Symmetric Encryption or Secret Key Cryptography (SKC) Asymmetric Encryption or Public Key Cryptography (PKC) or Asymmetric cryptography Digital Certificates and Certificate Authority (CA) Hash functions or Hashing algorithms Conclusion Key words Chapter 7 Internet of Things (IoTs) The Internet of Things ? An Introduction A Summary of IoT Applications Automotive Sector Energy Sector Healthcare Sector Manufacturing Sector Retail Sector Smart Structures (Buildings, Roads and Bridges Sector) Smart Homes Transportation Sector IoT Components, Data Processing Architectures and Protocols Basic Components and Data Processing Big data in IoT Architectures Protocols and Standards Network Consideration for IoT Devises Bandwidth Interoperability Power usage Range of Networks Security Conclusion Key words Chapter 8 Mobile Devices: The Smartphone Introduction A Brief History and Significant Milestones of Mobile Phones Components, Operating Systems (OS), Applications and Architecture Main Components Operating Systems (OS) and Applications (apps) Platform Architectures The Cellular Network What happens when a Mobile Phone is Turned ON? The Cell Tower or Cellular Base Station Mobile device tracking location: Cell Towers, GPS, and Indoor Localization Security Physical security Executable security Conclusion Key words Appendices Appendix A complete text of the Computer Fraud and Abuse Act (CFAA) 18 U.S.C. § 1030 Appendix B 17 U.S.C. § 1201 Circumvention of copyright protection systems Appendix B HIPAA §164.308 Administrative safeguards Appendix C Constructs & Supporting Theories Appendix D Sec. 13410 Improved Enforcement Appendix E 15 U.S. Code § 45 - Unfair methods of competition unlawful; prevention by Commission. U.S. Appendix F PART 681?Identity Theft Rules Appendix G 6 U.S.C. §1501. Definitions Appendix H 18 U.S.C. §1037 Fraud and related activity in connection with electronic mail Appendix I Valuable IT and Management Certifications Index














