Computer Forensics and Cyber Crime An Introduction 3rd Edition Britz Test Bank

$26.99$50.00 (-46%)

In stock

Computer Forensics and Cyber Crime An Introduction 3rd Edition Britz Test Bank.

Download sample

Computer Forensics and Cyber Crime An Introduction 3rd Edition Britz Test Bank

Product details:

  • ISBN-10 ‏ : ‎ 0132677717
  • ISBN-13 ‏ : ‎ 978-0132677714
  • Author: Dr. Marjie T. Britz

The leading introduction to computer crime and forensicsis now fully updated to reflect today’s newest attacks, laws, and investigatory best practices. Packed with new case studies, examples, and statistics, Computer Forensics and Cyber Crime, Third Edition adds up-to-the-minute coverage of smartphones, cloud computing, GPS, Mac OS X, Linux, Stuxnet, cyberbullying, cyberterrorism, search and seizure, online gambling, and much more. Covers all forms of modern and traditional computer crime, defines all relevant terms, and explains all technical and legal concepts in plain English, so students can succeed even if they have no technical, legal, or investigatory background.

Table contents:

  1. Chapter 1 INTRODUCTION AND OVERVIEW OF COMPUTER FORENSICS AND CYBERCRIME
  2. I. Introduction
  3. II. Cyberspace and Criminal Behavior
  4. III. Clarification of Terms
  5. IV. Traditional Problems Associated with Computer Crime
  6. a. Physicality and Jurisdictional Concerns
  7. b. Perceived Insignificance, Stereotypes, and Incompetence
  8. c. Prosecutorial Reluctance
  9. d. Lack of Reporting
  10. e. Lack of Resources
  11. f. Jurisprudential Inconsistency
  12. V. Extent of the Problem
  13. VI. The Emergence of e-Cash: A New Problem for Law Enforcement
  14. a. Prepaid Cards
  15. b. Stored Value Cards
  16. c. Mobile Payments
  17. d. Internet Payment Services
  18. e. Digital Precious Metals
  19. VII. Conclusions
  20. Discussion Questions
  21. Recommended Reading
  22. Web Resources
  23. Endnotes
  24. Chapter 2 COMPUTER TERMINOLOGY AND HISTORY
  25. I. A Brief History of Computers
  26. II. Computer Language
  27. a. Understanding Data
  28. III. Computer Hardware
  29. a. Input Devices
  30. b. Output Devices
  31. c. Hard Drives and Other Mass Storage Devices
  32. IV. Computer Software
  33. a. Boot Sequence
  34. b. Operating System
  35. V. Beyond DOS: Contemporary Operating Systems
  36. a. Microsoft Windows
  37. b. Macintosh
  38. c. UNIX
  39. d. LINUX
  40. e. Smart Phones
  41. VI. Application Software
  42. VII. A Brief History of the Internet
  43. VIII. Network Language
  44. a. Commonly Used Terms
  45. IX. Realms of the Cyberworld
  46. X. Data Bandwith Transfer Rates
  47. XI. Categorizing Internet Communication
  48. a. World Wide Web
  49. b. Newsgroups/Bulletin Boards (Usenet Groups)
  50. c. Internet Relay Chat
  51. XII. Future Issues and Conclusions
  52. Discussion Questions
  53. Recommended Reading
  54. Web Resources
  55. Endnotes
  56. Chapter 3 TRADITIONAL COMPUTER CRIME: EARLY HACKERS AND THEFT OF COMPONENTS
  57. I. Introduction
  58. II. Traditional Problems
  59. III. Recognizing and Defining Computer Crime
  60. IV. Three Incidents
  61. V. Phreakers: Yesterday’s Hackers
  62. a. What Is Phreaking?
  63. b. The War on Phreaking
  64. VI. Hacking
  65. a. Defining Hacking
  66. b. Evolution in the Hacking Community
  67. c. Contemporary Motivation
  68. d. Hierarchy of Contemporary Cybercriminals
  69. VII. Computers as Commodities
  70. a. Hardware
  71. VIII. Theft of Intellectual Property
  72. a. Software
  73. b. Film Piracy
  74. XI. Conclusions
  75. Discussion Questions
  76. Recommended Reading
  77. Web Resources
  78. Endnotes
  79. Chapter 4 CONTEMPORARY COMPUTER CRIME
  80. I. Web-Based Criminal Activity
  81. a. Interference with Lawful Use of Computers
  82. II. Malware
  83. a. Viruses and Worms
  84. b. DoS and DDoS Attacks
  85. c. Botnets and Zombie Armies
  86. d. Spam
  87. e. Ransomware and the Kidnapping of Information
  88. III. Theft of Information, Data Manipulation, and Web Encroachment
  89. a. Traditional Methods of Proprietary Information Theft
  90. b. Trade Secrets and Copyrights
  91. c. Political Espionage
  92. IV. Terrorism
  93. a. Cyberterrorism
  94. V. Neotraditional Crime: Old Wine in New Bottles
  95. a. Dissemination of Contraband or Offensive Materials
  96. b. Threatening and Harassing Communications
  97. c. Online Fraud
  98. d. e-Fencing
  99. e. Fraudulent Instruments
  100. VI. Ancillary Crimes
  101. a. Money Laundering
  102. VII. Conclusions
  103. Discussion Questions
  104. Recommended Reading
  105. Web Resources
  106. Endnotes
  107. Chapter 5 IDENTITY THEFT AND IDENTITY FRAUD
  108. I. Introduction
  109. II. Typologies of Identity Theft/Fraud
  110. a. Assumption of Identity
  111. b. Theft for Employment and/or Border Entry
  112. c. Criminal Record Identity Theft/Fraud
  113. d. Virtual Identity Theft/Fraud
  114. e. Credit Identity Theft/Fraud
  115. III. Prevalence and Victimology
  116. a. Victims and the Costs Associated with Victimization
  117. b. Future Increases
  118. IV. Physical Methods of Identity Theft
  119. a. Mail Theft
  120. b. Dumpster Diving
  121. c. Theft of Computers
  122. d. Bag Operations
  123. e. Child Identity Theft
  124. f. Insiders
  125. g. Fraudulent or Fictitious Companies
  126. h. Card Skimming, ATM Manipulation, and Fraudulent Machines
  127. V. Virtual or Internet-Facilitated Methods
  128. a. Phishing
  129. b. Spyware and Crimeware
  130. c. Keyloggers and Password Stealers
  131. d. Trojans
  132. VI. Crimes Facilitated by Identity Theft/Fraud
  133. a. Insurance and Loan Fraud
  134. b. Immigration Fraud and Border Crossings
  135. VII. Conclusions and Recommendations
  136. Discussion Questions
  137. Recommended Reading
  138. Web Resources
  139. Endnotes
  140. Chapter 6 TERRORISM AND ORGANIZED CRIME
  141. I. Terrorism
  142. a. Defining Terrorism
  143. b. Classification Through Motivation
  144. c. Roots of Contemporary Terrorism
  145. d. Terrorism as a Stage
  146. e. Cyberterrorism as a Concept
  147. II. Terror Online
  148. a. Propaganda, Information Dissemination, Recruiting, and Fundraising
  149. b. Training
  150. c. Research and Planning
  151. d. Communication
  152. e. Attack Mechanism
  153. III. Terrorism and Crime
  154. a. Criminal Activities
  155. b. Criminalizing Terrorist Acts
  156. c. Government Efforts
  157. d. Conclusions
  158. IV. Organized Crime
  159. a. Defining Organized Crime
  160. b. Distinguishing Organized Crime from Cybergangs
  161. V. Organized Crime and Technology
  162. a. Extortion
  163. b. Cargo Heists and Armed Robbery
  164. c. Fraud
  165. d. Money Laundering
  166. e. The Sex Trade
  167. f. Confidence Scams
  168. g. Fencing of Stolen Property
  169. h. Data Piracy and Counterfeit Goods
  170. i. Human Smuggling
  171. VI. Confronting Contemporary Organized Crime
  172. VII. The Intersection of Organized Crime and Terrorism
  173. Discussion Questions
  174. Recommended Reading
  175. Web Resources
  176. Endnotes
  177. Chapter 7 AVENUES FOR PROSECUTION AND GOVERNMENT EFFORTS
  178. I. Introduction
  179. II. Traditional Statutes
  180. III. The Evolution of Computer-Specific Statutes
  181. a. Computer Fraud and Abuse Act of 1986
  182. b. National Information Infrastructure Protection Act of 1996 (NIIPA)
  183. IV. Evolving Child Pornography Statutes
  184. V. Identity Theft and Financial Privacy Statutes
  185. a. Identity Theft and Assumption Deterrence Act of 1998
  186. b. The Financial Modernization Act of 1999
  187. c. Fair and Accurate Credit Transactions Act (FACTA) 2003
  188. d. Identity Theft Penalty Enhancement Act of 2004
  189. e. Identity Theft Enforcement and Restitution Act of 2008
  190. f. Additional Efforts to Protect Personal Information
  191. VI. Federally Funded Initiatives and Collaborations
  192. VII. Law Enforcement Operations and Tools in the United States
  193. a. Packet Sniffers and Key Loggers
  194. b. Data Mining
  195. c. Collaborations and Professional Associations
  196. VIII. International Efforts
  197. a. OECD and the Select Committee of Experts on Computer-Related Crime of the Council of Europe
  198. b. Council of Europe’s (CoE) Cybercrime Conventions
  199. IX. Conclusions
  200. Discussion Questions
  201. Recommended Reading
  202. Web Resources
  203. Endnotes
  204. Chapter 8 APPLYING THE FIRST AMENDMENT TO COMPUTER-RELATED CRIME
  205. I. Introduction and General Principles
  206. II. Obscenity in General
  207. III. Traditional Notions of Decency
  208. IV. Emerging Statutes and the Availability of Obscene Material to Children
  209. V. Traditional Attempts to Criminalize Child Pornography
  210. VI. Applying Case Law to Traditional Child Pornography Statutes
  211. a. New York v. Ferber
  212. b. Osborne v. Ohio
  213. VII. Technology-Specific Legislation—Contention in the Courts
  214. a. Child Pornography Prevention Act
  215. b. Ashcroft v. Free Speech Coalition
  216. c. Prosecutorial Remedies and Other Tools to End the Exploitation of Children Today Act (PROTECT)
  217. d. U.S. v. Williams
  218. VIII. Internet Gambling
  219. a. Unlawful Internet Gambling Enforcement Act of 2006 (UIGEA)
  220. b. Case law on Internet Gaming Statutes
  221. c. Lack of International Cooperation and the WTO
  222. IX. Future Issues and Conclusions
  223. Discussion Questions
  224. Recommended Reading
  225. Web Resources
  226. Endnotes
  227. Chapter 9 THE FOURTH AMENDMENT AND OTHER LEGAL ISSUES
  228. I. The Fourth Amendment
  229. a. Probable Cause
  230. b. Reasonable Suspicion
  231. II. Warranted Searches and Computers
  232. a. Particularity
  233. b. Seizure of Evidence
  234. c. Third-Party Origination
  235. d. Other Arguments Used in Warranted Searches
  236. III. Warrantless Searches
  237. a. Consent
  238. b. Exigent Circumstances and Emergency Situations
  239. c. Incident to Arrest
  240. d. Plain View
  241. e. Border Searches
  242. f. Other Warrantless Searches
  243. IV. Exclusionary Rule
  244. V. Electronic Surveillance and the Right to Privacy
  245. a. Types of Recognized Privacy
  246. VI. Private versus Public Sector Searches
  247. VII. Application of Ortega to E-mail: The Cases of Simons and Monroe
  248. VII. The Electronic Communications Privacy Act and The Privacy Protection Act of 1980
  249. a. Electronic Communications Privacy Act of 1986
  250. b. Three Titles under ECPA
  251. c. Privacy Protection Act
  252. d. Defining Interception under ECPA and the PPA
  253. e. Communications Assistance for Law Enforcement Act
  254. f. Challenges to the CALEA
  255. g. Applying the Wiretap Act to E-mail Interceptions—U.S. v. Councilman
  256. VIII. The Patriot Act
  257. a. Enhanced Presidential Authority
  258. b. Electronic Surveillance and Criminal Investigations
  259. c. National Security Letters and Other Fourth Amendment Issues
  260. IX. Other Questions Regarding Privacy
  261. a. Peer-to-Peer or File sharing
  262. b. Internet Service Provider Subscriber Records
  263. c. Web sites
  264. d. Cell phones
  265. X. Other Legal Considerations
  266. a. Vicinage
  267. b. Undercover Techniques
  268. c. Sentencing Guidelines
  269. XI. Conclusions
  270. Discussion Questions
  271. Recommended Reading
  272. Web Resources
  273. Endnotes
  274. Chapter 10 COMPUTER FORENSICS: TERMINOLOGY AND REQUIREMENTS
  275. I. Computer Forensics—An Emerging Discipline
  276. II. Traditional Problems in Computer Investigations
  277. a. Inadequate Resources
  278. b. Lack of Communication and Cooperation among Agencies
  279. c. Over-reliance on Automated Programs and Self-proclaimed Experts
  280. d. Lack of Reporting
  281. e. Evidence Corruption
  282. IV. Disk Structure and Digital Evidence
  283. a. Disk Structure and Data Storage
  284. b. Partition Table
  285. c. File Systems
  286. c. Firmware—Operating Instructions
  287. e. Data Integrity
  288. V. Developing Computer Forensic Science Capabilities
  289. VI. Minimum Housing Requirements
  290. VII. Minimum Hardware Requirements
  291. VIII. Minimum Software Requirements
  292. a. Data Preservation, Duplication, and Verification Tools
  293. b. Data Recovery/Extraction Utilities
  294. c. Data Analysis Software
  295. d. Reporting Software
  296. e. Miscellaneous Software
  297. IX. A Sampling of Popular Forensic Software
  298. a. Guidance Software
  299. b. Access Data
  300. c. Other Forensic Utilities
  301. X. Conclusions
  302. Discussion Questions
  303. Recommended Reading
  304. Web Resources
  305. Endnotes
  306. Chapter 11 SEARCHING AND SEIZING COMPUTER-RELATED EVIDENCE
  307. I. Traditional Problems Associated with Finding Digital Evidence
  308. II. Pre-search Activities
  309. a. Warrant Preparation and Application
  310. b. Plan Preparation and Personnel Gathering
  311. c. Preparing a Toolkit
  312. d. Traditional Equipment
  313. e. Computer-Specific Equipment and Materials
  314. III. On-scene Activities
  315. a. Knock, Notice, and Document
  316. b. Securing the Crime Scene
  317. c. Determining the Need for Additional Assistance
  318. d. Scene Processing
  319. e. Locating Evidence
  320. f. Seizure and Documentation of Evidence
  321. g. Bagging and Tagging
  322. h. Interviewing Witnesses
  323. i. Scene Departure and Transportation of Evidence to Lab
  324. IV. Conclusions
  325. Discussion Questions
  326. Recommended Reading
  327. Web Resources
  328. Endnotes
  329. Chapter 12 PROCESSING OF EVIDENCE AND REPORT PREPARATION
  330. I. Aspects of Data Analysis
  331. a. Establish Forensically Sterile Conditions
  332. b. Ensure Legitimacy and Capabilities of Analysis Tools
  333. c. Physical Examination
  334. d. Creation and Verification of Image
  335. e. Jumping the CMOS Password
  336. f. Short-Circuiting the Chip
  337. g. Pulling the Battery
  338. h. Recovering Passwords
  339. i. Image Verification
  340. j. Logical Examination
  341. k. Restoration of Files
  342. l. Listing of Files
  343. m. Examine Unallocated Space for Data Remnants
  344. n. Unlocking Files
  345. q. Examination of User Data Files
  346. r. Piping of Evidence
  347. s. Examination of Executable Programs
  348. t. Evidence from Internet Activity
  349. II. Non-Windows Operating Systems
  350. a. Macintosh Operating System
  351. b. Linux/Unix Operating Systems
  352. III. Smart Phones and GPS Forensics
  353. a. Smartphones
  354. IV. A Sample of Popular Products
  355. V. Naviation Sysstems
  356. VI. Report Preparation and Final Documentation
  357. VII. Conclusions
  358. Discussion Questions
  359. Recommended Reading
  360. Web Resources
  361. Endnotes
  362. Chapter 13 CONCLUSIONS AND FUTURE ISSUES
  363. I. Traditional Problems and Recommendations
  364. a. Establishing Technology-Neutral Legislation
  365. b. Establishing Accountability for Internet Users
  366. c. Increasing Public Awareness and Research Capabilities
  367. d. Increasing Interagency and Intradepartmental Cooperation
  368. e. Developing Relationships between Investigative Agencies and the Private Sector
  369. f. Developing International Cooperation
  370. g. Standardization of Accreditation or Expertise
  371. h. Miscellaneous
  372. II. Additional Approaches to Internet Crime
  373. III. Future Trends and Emerging Concerns
  374. a. Wireless Communications
  375. b. Data Hiding: Remote Storage, Encryption, and the Like
  376. c. Governing Decency and Virtual Pornography
  377. d. Data Mining and Increased Interoperability
  378. IV. Conclusions
  379. Discussion Questions
  380. Web Resources
  381. Endnotes
  382. Bibliography
  383. Index

People also search:

computer forensics and cyber crime an introduction 3rd edition pdf

computer forensics and cyber crime an introduction 3rd edition

what is computer forensics in cyber security

types of computer forensics

computer forensics examples

 

 

Instant download after Payment is complete

Main Menu