Buch, Englisch, 496 Seiten, Format (B × H): 186 mm x 231 mm, Gewicht: 1000 g
An Introduction to Solving Crimes in Cyberspace
Buch, Englisch, 496 Seiten, Format (B × H): 186 mm x 231 mm, Gewicht: 1000 g
ISBN: 978-0-12-407817-8
Verlag: Elsevier Science
Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim.
Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.
Zielgruppe
Digital investigators, law enforcement personnel, private investigators, DoD, intelligence agencies and attorneys
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
1. Introduction to Internet Crime 2. Internet Criminals 3. How the Internet Works 4. Collecting Legally Defensible Online Evidence 5. Documenting Online Evidence 6. Using Online Investigative Tools 7. Online Digital Officer Safety 8. Tracing IP Addresses Through the Internet 9. Working Unseen on the Internet 10. Covert Operations on the Internet 11. Conducting Reactive and Proactive Internet Investigations 12. Internet Resources for Locating Evidence 13. Investigating Websites and Webpages 14. Investigating Social Networking Sites 15. Investigating Methods of Communication 16. Detection and Prevention of Internet Crimes 17. Putting it all together 18. Conclusion