Cyber Security : Understanding Cyber Crimes, Computer Forensics and Legal Perspectives
Material type:
TextPublication details: New Delhi Wiley India Pvt. Ltd 2024Description: xlv, 570, i18 p 24 x 18 cmISBN: - 9788126521791
- 004 GOD
| Item type | Current library | Collection | Call number | Status | Date due | Barcode |
|---|---|---|---|---|---|---|
|
|
Raj Kumar Goel Institute of Technology | DS (Data Science) | 004 GOD (Browse shelf(Opens below)) | Not for loan | 94715 | |
|
|
Raj Kumar Goel Institute of Technology | DS (Data Science) | 004 GOD (Browse shelf(Opens below)) | Not for loan | 94716 | |
|
|
Raj Kumar Goel Institute of Technology | DS (Data Science) | 004 GOD (Browse shelf(Opens below)) | Available | 94717 | |
|
|
Raj Kumar Goel Institute of Technology | DS (Data Science) | 004 GOD (Browse shelf(Opens below)) | Checked out | 08/09/2025 | 94718 |
|
|
Raj Kumar Goel Institute of Technology | DS (Data Science) | 004 GOD (Browse shelf(Opens below)) | Checked out | 08/11/2024 | 94719 |
|
|
Raj Kumar Goel Institute of Technology | DS (Data Science) | 004 GOD (Browse shelf(Opens below)) | Available | 94720 | |
|
|
Raj Kumar Goel Institute of Technology | DS (Data Science) | 004 GOD (Browse shelf(Opens below)) | Available | 94721 | |
|
|
Raj Kumar Goel Institute of Technology | DS (Data Science) | 004 GOD (Browse shelf(Opens below)) | Available | 94722 | |
|
|
Raj Kumar Goel Institute of Technology | DS (Data Science) | 004 GOD (Browse shelf(Opens below)) | Available | 94723 | |
|
|
Raj Kumar Goel Institute of Technology | DS (Data Science) | 004 GOD (Browse shelf(Opens below)) | Available | 94724 |
Browsing Raj Kumar Goel Institute of Technology shelves, Collection: DS (Data Science) Close shelf browser (Hides shelf browser)
This book, focusing on cyberthreats and cybersecurity, provides the much needed awareness in the times of growing cybercrime episodes.
·Comprehensive treatment of important topic - cybersecurity to help readers understand the implications of cybercrime.
·The book provides adequate orientation on laws in reference to cybercrime and cybersecurity taking into account the Indian as well as global scenario.
·Awareness created through simple practical tips and tricks, educates readers to learn how to avoid becoming victims of cybercrime.
·Written by InfoSec domain SME and co-authored by qualified ethical hacking professional who is also a security certified.
·Well-presented case illustrations and examples from real life to underline the significance of topics addressed in each chapter
Introduction to Cybercrime
Introduction
Cybercrime: Definition and Origins of the Word
Cybercrime and Information Security
Who are Cybercriminals?
Classifications of Cybercrimes
Cybercrime: The Legal Perspectives
Cybercrimes: An Indian Perspective
Cybercrime and the Indian ITA 2000
A Global Perspective on Cybercrimes
Cybercrime Era: Survival Mantra for the Netizens
Concluding Remarks and Way Forward to Further Chapters
Cyberoffenses: How Criminals Plan Them
Introduction
How Criminals Plan the Attacks
Social Engineering
Cyberstalking
Cybercafe and Cybercrimes
Botnets: The Fuel for Cybercrime
Attack Vector
Cloud Computing
Cybercrime: Mobile and Wireless Devices
Introduction
Proliferation of Mobile and Wireless Devices
Trends in Mobility
Credit Card Frauds in Mobile and Wireless Computing Era
Security Challenges Posed by Mobile Devices
Registry Settings for Mobile Devices
Authentication Service Security
Attacks on Mobile/Cell Phones
Mobile Devices: Security Implications for Organizations
Organizational Measures for Handling Mobile
Organizational Security Policies and Measures in Mobile Computing Era
Laptops
Tools and Methods Used in Cybercrime
Introduction
Proxy Servers and Anonymizers
Phishing
Password Cracking
Keyloggers and Spywares
Virus and Worms
Trojan Horses and Backdoors
Steganography
DoS and DDoS Attacks
SQL Injection
Buffer Overflow
Attacks on Wireless Networks
Phishing and Identity Theft
Introduction
Phishing
Identity Theft (ID Theft)
Cybercrimes and Cybersecurity: The Legal Perspectives
Introduction
Cybercrime and the Legal Landscape around the World
Why Do We Need Cyberlaws: The Indian Context
The Indian IT Act
Challenges to Indian Law and Cybercrime Scenario in India
Consequences of Not Addressing the Weakness in Information Technology Act
Digital Signatures and the Indian IT Act
Amendments to the Indian IT Act
Cybercrime and Punishment
Cyberlaw, Technology and Students: Indian Scenario
Understanding Computer Forensics
Introduction
Historical Background of Cyberforensics
Digital Forensics Science
The Need for Computer Forensics
Cyberforensics and Digital Evidence
Forensics Analysis of E-Mail
Digital Forensics Life Cycle
Chain of Custody Concept
Network Forensics
Approaching a Computer Forensics Investigation
Setting up a Computer Forensics Laboratory: Understanding the Requirements
Computer Forensics and Steganography
Relevance of the OSI 7 Layer Model to Computer Forensics
Forensics and Social Networking Sites: The Security/Privacy Threats
Computer Forensics from Compliance Perspective
Challenges in Computer Forensics
Special Tools and Techniques
Forensics Auditing
Antiforensics
Forensics of Hand-Held Devices
Introduction
Understanding Cell Phone Working Characteristics
Hand-Held Devices and Digital Forensics
Toolkits for Hand-Held Device Forensics
Forensics of iPods and Digital Music Devices
An Illustration on Real Life Use of Forensics
Techno-Legal Challenges with Evidence from Hand-Held Devices
Organizational Guidelines on Cell Phone Forensics
Cybersecurity: Organizational Implications
Introduction
Cost of Cybercrimes and IPR Issues: Lessons for Organizations
Web Threats for Organizations: The Evils and Perils
Security and Privacy Implications from Cloud Computing
Social Media Marketing: Security Risks and Perils for Organizations
Social Computing and the Associated Challenges for Organizations
Protecting Peoples Privacy in the Organization
Organizational Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage Policy
Incident Handling: An Essential Component of Cybersecurity
Forensics Best Practices for Organizations
Media and Asset Protection: Best Practices for Organizations
Importance of Endpoint Security in Organizations
Cybercrime and Cyberterrorism: Social, Political, Ethical and Psychological Dimensions
Introduction
Intellectual Property in the Cyberspace
The Ethical Dimension of Cybercrimes
The Psychology, Mindset and Skills of Hackers and Other Cybercriminals
Sociology of Cybercriminals
Information Warfare: Perception or An Eminent Reality?
Cybercrime: Illustrations, Examples and Mini-Cases
Introduction
Real-Life Examples
Mini-Cases
Illustrations of Financial Frauds in Cyber Domain
Digital Signature-Related Crime Scenarios
Digital Forensics Case Illustrations
Online Scams
Careers in Cybersecurity
Introduction
IT Security Organization
Career Paths in Cybersecurity
Cybersecurity Certifications
Guide Path
Index

There are no comments on this title.