Amazon cover image
Image from Amazon.com
Image from Google Jackets

Cyber Security : Understanding Cyber Crimes, Computer Forensics and Legal Perspectives

By: Contributor(s): Material type: TextTextPublication details: New Delhi Wiley India Pvt. Ltd 2024Description: xlv, 570, i18 p 24 x 18 cmISBN:
  • 9788126521791
DDC classification:
  • 004 GOD
Summary: Introduction to Cybercrime Introduction Cybercrime: Definition and Origins of the Word Cybercrime and Information Security Who are Cybercriminals? Classifications of Cybercrimes Cybercrime: The Legal Perspectives Cybercrimes: An Indian Perspective Cybercrime and the Indian ITA 2000 A Global Perspective on Cybercrimes Cybercrime Era: Survival Mantra for the Netizens Concluding Remarks and Way Forward to Further Chapters Cyberoffenses: How Criminals Plan Them Introduction How Criminals Plan the Attacks Social Engineering Cyberstalking Cybercafe and Cybercrimes Botnets: The Fuel for Cybercrime Attack Vector Cloud Computing Cybercrime: Mobile and Wireless Devices Introduction Proliferation of Mobile and Wireless Devices Trends in Mobility Credit Card Frauds in Mobile and Wireless Computing Era Security Challenges Posed by Mobile Devices Registry Settings for Mobile Devices Authentication Service Security Attacks on Mobile/Cell Phones Mobile Devices: Security Implications for Organizations Organizational Measures for Handling Mobile Organizational Security Policies and Measures in Mobile Computing Era Laptops Tools and Methods Used in Cybercrime Introduction Proxy Servers and Anonymizers Phishing Password Cracking Keyloggers and Spywares Virus and Worms Trojan Horses and Backdoors Steganography DoS and DDoS Attacks SQL Injection Buffer Overflow Attacks on Wireless Networks Phishing and Identity Theft Introduction Phishing Identity Theft (ID Theft) Cybercrimes and Cybersecurity: The Legal Perspectives Introduction Cybercrime and the Legal Landscape around the World Why Do We Need Cyberlaws: The Indian Context The Indian IT Act Challenges to Indian Law and Cybercrime Scenario in India Consequences of Not Addressing the Weakness in Information Technology Act Digital Signatures and the Indian IT Act Amendments to the Indian IT Act Cybercrime and Punishment Cyberlaw, Technology and Students: Indian Scenario Understanding Computer Forensics Introduction Historical Background of Cyberforensics Digital Forensics Science The Need for Computer Forensics Cyberforensics and Digital Evidence Forensics Analysis of E-Mail Digital Forensics Life Cycle Chain of Custody Concept Network Forensics Approaching a Computer Forensics Investigation Setting up a Computer Forensics Laboratory: Understanding the Requirements Computer Forensics and Steganography Relevance of the OSI 7 Layer Model to Computer Forensics Forensics and Social Networking Sites: The Security/Privacy Threats Computer Forensics from Compliance Perspective Challenges in Computer Forensics Special Tools and Techniques Forensics Auditing Antiforensics Forensics of Hand-Held Devices Introduction Understanding Cell Phone Working Characteristics Hand-Held Devices and Digital Forensics Toolkits for Hand-Held Device Forensics Forensics of iPods and Digital Music Devices An Illustration on Real Life Use of Forensics Techno-Legal Challenges with Evidence from Hand-Held Devices Organizational Guidelines on Cell Phone Forensics Cybersecurity: Organizational Implications Introduction Cost of Cybercrimes and IPR Issues: Lessons for Organizations Web Threats for Organizations: The Evils and Perils Security and Privacy Implications from Cloud Computing Social Media Marketing: Security Risks and Perils for Organizations Social Computing and the Associated Challenges for Organizations Protecting Peoples Privacy in the Organization Organizational Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage Policy Incident Handling: An Essential Component of Cybersecurity Forensics Best Practices for Organizations Media and Asset Protection: Best Practices for Organizations Importance of Endpoint Security in Organizations Cybercrime and Cyberterrorism: Social, Political, Ethical and Psychological Dimensions Introduction Intellectual Property in the Cyberspace The Ethical Dimension of Cybercrimes The Psychology, Mindset and Skills of Hackers and Other Cybercriminals Sociology of Cybercriminals Information Warfare: Perception or An Eminent Reality? Cybercrime: Illustrations, Examples and Mini-Cases Introduction Real-Life Examples Mini-Cases Illustrations of Financial Frauds in Cyber Domain Digital Signature-Related Crime Scenarios Digital Forensics Case Illustrations Online Scams Careers in Cybersecurity Introduction IT Security Organization Career Paths in Cybersecurity Cybersecurity Certifications Guide Path Index
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Reference Reference Raj Kumar Goel Institute of Technology DS (Data Science) 004 GOD (Browse shelf(Opens below)) Not for loan 94715
Reference Reference Raj Kumar Goel Institute of Technology DS (Data Science) 004 GOD (Browse shelf(Opens below)) Not for loan 94716
General Books General Books Raj Kumar Goel Institute of Technology DS (Data Science) 004 GOD (Browse shelf(Opens below)) Available 94717
General Books General Books Raj Kumar Goel Institute of Technology DS (Data Science) 004 GOD (Browse shelf(Opens below)) Checked out 08/09/2025 94718
General Books General Books Raj Kumar Goel Institute of Technology DS (Data Science) 004 GOD (Browse shelf(Opens below)) Checked out 08/11/2024 94719
General Books General Books Raj Kumar Goel Institute of Technology DS (Data Science) 004 GOD (Browse shelf(Opens below)) Available 94720
General Books General Books Raj Kumar Goel Institute of Technology DS (Data Science) 004 GOD (Browse shelf(Opens below)) Available 94721
General Books General Books Raj Kumar Goel Institute of Technology DS (Data Science) 004 GOD (Browse shelf(Opens below)) Available 94722
General Books General Books Raj Kumar Goel Institute of Technology DS (Data Science) 004 GOD (Browse shelf(Opens below)) Available 94723
General Books General Books Raj Kumar Goel Institute of Technology DS (Data Science) 004 GOD (Browse shelf(Opens below)) Available 94724

This book, focusing on cyberthreats and cybersecurity, provides the much needed awareness in the times of growing cybercrime episodes.

·Comprehensive treatment of important topic - cybersecurity to help readers understand the implications of cybercrime.

·The book provides adequate orientation on laws in reference to cybercrime and cybersecurity taking into account the Indian as well as global scenario.

·Awareness created through simple practical tips and tricks, educates readers to learn how to avoid becoming victims of cybercrime.

·Written by InfoSec domain SME and co-authored by qualified ethical hacking professional who is also a security certified.

·Well-presented case illustrations and examples from real life to underline the significance of topics addressed in each chapter

Introduction to Cybercrime

Introduction

Cybercrime: Definition and Origins of the Word

Cybercrime and Information Security

Who are Cybercriminals?

Classifications of Cybercrimes

Cybercrime: The Legal Perspectives

Cybercrimes: An Indian Perspective

Cybercrime and the Indian ITA 2000

A Global Perspective on Cybercrimes

Cybercrime Era: Survival Mantra for the Netizens

Concluding Remarks and Way Forward to Further Chapters

Cyberoffenses: How Criminals Plan Them

Introduction

How Criminals Plan the Attacks

Social Engineering

Cyberstalking

Cybercafe and Cybercrimes

Botnets: The Fuel for Cybercrime

Attack Vector

Cloud Computing

Cybercrime: Mobile and Wireless Devices

Introduction

Proliferation of Mobile and Wireless Devices

Trends in Mobility

Credit Card Frauds in Mobile and Wireless Computing Era

Security Challenges Posed by Mobile Devices

Registry Settings for Mobile Devices

Authentication Service Security

Attacks on Mobile/Cell Phones

Mobile Devices: Security Implications for Organizations

Organizational Measures for Handling Mobile

Organizational Security Policies and Measures in Mobile Computing Era

Laptops

Tools and Methods Used in Cybercrime

Introduction

Proxy Servers and Anonymizers

Phishing

Password Cracking

Keyloggers and Spywares

Virus and Worms

Trojan Horses and Backdoors

Steganography

DoS and DDoS Attacks

SQL Injection

Buffer Overflow

Attacks on Wireless Networks

Phishing and Identity Theft

Introduction

Phishing

Identity Theft (ID Theft)

Cybercrimes and Cybersecurity: The Legal Perspectives

Introduction

Cybercrime and the Legal Landscape around the World

Why Do We Need Cyberlaws: The Indian Context

The Indian IT Act

Challenges to Indian Law and Cybercrime Scenario in India

Consequences of Not Addressing the Weakness in Information Technology Act

Digital Signatures and the Indian IT Act

Amendments to the Indian IT Act

Cybercrime and Punishment

Cyberlaw, Technology and Students: Indian Scenario

Understanding Computer Forensics

Introduction

Historical Background of Cyberforensics

Digital Forensics Science

The Need for Computer Forensics

Cyberforensics and Digital Evidence

Forensics Analysis of E-Mail

Digital Forensics Life Cycle

Chain of Custody Concept

Network Forensics

Approaching a Computer Forensics Investigation

Setting up a Computer Forensics Laboratory: Understanding the Requirements

Computer Forensics and Steganography

Relevance of the OSI 7 Layer Model to Computer Forensics

Forensics and Social Networking Sites: The Security/Privacy Threats

Computer Forensics from Compliance Perspective

Challenges in Computer Forensics

Special Tools and Techniques

Forensics Auditing

Antiforensics

Forensics of Hand-Held Devices

Introduction

Understanding Cell Phone Working Characteristics

Hand-Held Devices and Digital Forensics

Toolkits for Hand-Held Device Forensics

Forensics of iPods and Digital Music Devices

An Illustration on Real Life Use of Forensics

Techno-Legal Challenges with Evidence from Hand-Held Devices

Organizational Guidelines on Cell Phone Forensics

Cybersecurity: Organizational Implications

Introduction

Cost of Cybercrimes and IPR Issues: Lessons for Organizations

Web Threats for Organizations: The Evils and Perils

Security and Privacy Implications from Cloud Computing

Social Media Marketing: Security Risks and Perils for Organizations

Social Computing and the Associated Challenges for Organizations

Protecting Peoples Privacy in the Organization

Organizational Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage Policy

Incident Handling: An Essential Component of Cybersecurity

Forensics Best Practices for Organizations

Media and Asset Protection: Best Practices for Organizations

Importance of Endpoint Security in Organizations

Cybercrime and Cyberterrorism: Social, Political, Ethical and Psychological Dimensions

Introduction

Intellectual Property in the Cyberspace

The Ethical Dimension of Cybercrimes

The Psychology, Mindset and Skills of Hackers and Other Cybercriminals

Sociology of Cybercriminals

Information Warfare: Perception or An Eminent Reality?

Cybercrime: Illustrations, Examples and Mini-Cases

Introduction

Real-Life Examples

Mini-Cases

Illustrations of Financial Frauds in Cyber Domain

Digital Signature-Related Crime Scenarios

Digital Forensics Case Illustrations

Online Scams

Careers in Cybersecurity

Introduction

IT Security Organization

Career Paths in Cybersecurity

Cybersecurity Certifications

Guide Path

Index

There are no comments on this title.

to post a comment.
Implemented & Customized by: BestBookBuddies

Powered by Koha