Description
Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime.- Written by experts in cyber crime, digital investigations, and counter-terrorism- Learn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigators- Keep up to date on current national and international law regarding cyber crime and cyber terrorism- See just how significant cyber crime has become, and how important cyber law enforcement is in the modern world
Table of Contents
1. Cyberspace: The new frontier for policing?2. Definitions of Cyber Terrorism3. New and emerging threats of cyber crime and terrorism4. Police investigation processes: practical tools and techniques for tackling cyber crimes5. Cyber-specifications: capturing user requirements for cyber-security investigations6. High-tech investigations of cyber crime7. Seizing, imaging, and analyzing digital evidence: step-by-step guidelines8. Digital forensics education, training and awareness9. Understanding the situational awareness in cybercrimes: case studies10. Terrorist use of the internet11. ICT as a protection tool against child exploitation12. Cybercrime classification and characteristics13. Cyber terrorism: Case studies14. Social media and Big Data15. Social media and its role for LEAs: Review and applications16. The rise of cyber liability insurance17. Responding to cyber crime and cyber terrorism—botnets an insidious threat18. Evolution of TETRA through the integration with a number of communication platforms to support public protection and disaster relief (PPDR)



