Cybercrime and information technology : theory and practice - the computer network infostructure and computer security, cybersecurity laws, Internet of Things (IoT) and mobile devices /: theory and practice - the computer network infostructure and computer security, cybersecurity laws, Internet of Things (IoT) and mobile devices. (2021)
- Record Type:
- Book
- Title:
- Cybercrime and information technology : theory and practice - the computer network infostructure and computer security, cybersecurity laws, Internet of Things (IoT) and mobile devices /: theory and practice - the computer network infostructure and computer security, cybersecurity laws, Internet of Things (IoT) and mobile devices. (2021)
- Main Title:
- Cybercrime and information technology : theory and practice - the computer network infostructure and computer security, cybersecurity laws, Internet of Things (IoT) and mobile devices
- Further Information:
- Note: Alex Alexandrou.
- Authors:
- (Professor of information technology security), Alexandrou, Alex
- Contents:
- Preface Acknowledgement Author’s Bio Chapter 1 Understanding Essential Computer Concepts. Understanding Computation Input Understanding Binary Data Conversion from Binary to Decimal Conversion from Decimal to Binary Hexadecimal Converting from Hexadecimal to Binary Conversion from Binary to Hexadecimal ASCII, EBCDIC & UNICODE Processing (Boolean Algebra, Logic Gates, Truth Tables) Processor Types (32-bit processors vs. 64-bit processors) Storage Compression (Lossy and Lossless Compression) Output Pixels Color depth Color models Screen resolution Beyond Conventional Computing Quantum Computing is Poised to Change Everything A Brief History of Computing Devices Conclusion Key words Chapter 2 Cybercrime in a Data-Driven and Techno-Centric Society Cybercrime and the Cybercriminal The Origin and Definition of Cybercrime – It’s the Data, always the Data Brief Summary of the Phases and Evolution of Cybercrime Phase I Phase II Phase III Phase IV Cybercrime Categories The three Cybercrime Categories The future of Cybercrime The making of the Cybercriminal Cybercrime and The Internet of Things (IoT) Cybercrime: Machine Learning & Artificial Intelligence Online Child Sexual Abuse and Exploitation (CSAE) Cost of Cybercrime The Role of Cryptocurrency in Cybercrime State-Sponsored Cyberwarfare and Industrial Espionage Conclusion Key words Chapter 3 Understanding the US Legal System Introduction Jurisdiction and Extradition Online anonymity Digital evidence Most Cybercrimes are notPreface Acknowledgement Author’s Bio Chapter 1 Understanding Essential Computer Concepts. Understanding Computation Input Understanding Binary Data Conversion from Binary to Decimal Conversion from Decimal to Binary Hexadecimal Converting from Hexadecimal to Binary Conversion from Binary to Hexadecimal ASCII, EBCDIC & UNICODE Processing (Boolean Algebra, Logic Gates, Truth Tables) Processor Types (32-bit processors vs. 64-bit processors) Storage Compression (Lossy and Lossless Compression) Output Pixels Color depth Color models Screen resolution Beyond Conventional Computing Quantum Computing is Poised to Change Everything A Brief History of Computing Devices Conclusion Key words Chapter 2 Cybercrime in a Data-Driven and Techno-Centric Society Cybercrime and the Cybercriminal The Origin and Definition of Cybercrime – It’s the Data, always the Data Brief Summary of the Phases and Evolution of Cybercrime Phase I Phase II Phase III Phase IV Cybercrime Categories The three Cybercrime Categories The future of Cybercrime The making of the Cybercriminal Cybercrime and The Internet of Things (IoT) Cybercrime: Machine Learning & Artificial Intelligence Online Child Sexual Abuse and Exploitation (CSAE) Cost of Cybercrime The Role of Cryptocurrency in Cybercrime State-Sponsored Cyberwarfare and Industrial Espionage Conclusion Key words Chapter 3 Understanding the US Legal System Introduction Jurisdiction and Extradition Online anonymity Digital evidence Most Cybercrimes are not reported A brief overview of the Legal system in the United States The Constitution Statutory or Statute Law Administrative laws (agency regulations) and Ordinance Law Judicial decisions or Precedents or Case law The Courts system Types of Laws Administrative law Civil law Criminal law Conclusion Key words Chapter 4 Laws, standards and regulations affecting Cybercrime Introduction Current Legislative Framework in the U.S. Anti-Hacking Laws The Federal Computer Fraud and Abuse Act (CFAA) Key terms and major cases to understand CFAA Limitations of the CFAA Computer Hacking Laws from individual states The Economic Espionage Act Of 1996 (EEA) The Digital Millennium Copyright Act (DMCA) Data Security Laws and Regulations in the Private Sector Entities The National Institute of Standards and Technology (NIST) Cybersecurity Framework The Health Insurance Portability and Accountability Act (HIPAA) Health Information Technology for Economic and Clinical Health Act (HITECH) Federal Trade Commission Act The Gramm-Leach-Bliley Act of 1999 (GLBA) Red Flags Rule The Federal Energy Regulatory Commission (FERC) Nuclear Regulatory Commission (NRC) Public & Private Sector Entities Partnerships in Cyberspace Cybersecurity Information Sharing Act of 2015 (CISA) The Cybersecurity and Infrastructure Security Agency (CISA) The National Cybersecurity and Critical Infrastructure Protection Act of 2014 (NCPA) Cybersecurity Enhancement Act of 2014 (CEA) Cybersecurity Requirements for Federal Government Contractors Federal Information Security Modernization Act of 2014 NIST Information Security controls for Government Agencies and Contractors Most Important Internet Surveillance Laws in the U.S. All Writs Act Fourth Amendment Search and Seizure Exceptions to the search warrant rule Electronic Surveillance: private vs public Exclusionary Rule and the Good Faith Exception The USA Patriot Act and the Fourth Amendment Electronic Communication Privacy Act (ECPA) of 1986 Communication Assistant for Law enforcement Act of 1994 (CALEA) Key Privacy Laws in the U.S. Privacy Act of 1974 The Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act) 18 U.S.C. § 1037. Fraud and Related Activity in Connection with Electronic Mail U.S.C. § 1029 Fraud and Related Activity in Connection with Access Devices 18 U.S. Code § 1028 Fraud and related activity in connection with identification documents, authentication features, and information Children’s Online Privacy Protection Act of 1998 (COPPA) Video Privacy Protection Act (VPPA) of 1988 When U.S. began taking privacy seriously Conclusion Key words Chapter 5 The Networking Environment Introduction to Computer Networking Protocols The World Wide Web and the Internet Essential Computer Network Components and Terminology Types of Networks Network Topology The Open Systems Interconnection (OSI) model The Internet protocol Suite (TPC/IP) < … (more)
- Edition:
- 1st
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2021
- Extent:
- 1 online resource, illustrations (black and white)
- Subjects:
- 364.168
Computer crimes
Computer security
Computer security -- Law and legislation
Computer networks -- Security measures - Languages:
- English
- ISBNs:
- 9781000426922
9781000426861
9780429318726 - Related ISBNs:
- 9780367251574
9781032053851 - Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.649618
- Ingest File:
- 07_013.xml