UID:
almahu_9948026075402882
Format:
1 online resource (751 p.)
ISBN:
1-281-05605-7
,
9786611056056
,
0-08-048078-0
Content:
""Cybercrime and cyber-terrorism represent a serious challenge to society as a whole."" - Hans Christian Krüger, Deputy Secretary General of the Council of EuropeCrime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why tha
Note:
Includes index.
,
Cover; Contents; Foreword; Chapter 1 Facing the Cybercrime Problem Head On; Introduction; Quantifying the Crisis; Defining Cybercrime; Moving from the General to the Specific; Understanding the Importance of Jurisdictional Issues; Differentiating Crimes That Use the Net from Crimes That Depend on the Net; Collecting Statistical Data on Cybercrime; Understanding the Crime Reporting System; Categorizing Crimes for the National Reporting System; Toward a Working Definition of Cybercrime; U.S. Federal and State Statutes; International Law:The United Nations Definition of Cybercrime
,
Categorizing CybercrimeDeveloping Categories of Cybercrimes; Violent or Potentially Violent Cybercrime Categories; Nonviolent Cybercrime Categories; Prioritizing Cybercrime Enforcement; Fighting Cybercrime; Determining Who Will Fight Cybercrime; Educating Cybercrime Fighters; Educating Legislators and Criminal Justice Professionals; Educating Information Technology Professionals; Educating and Engaging the Community; Getting Creative in the Fight Against Cybercrime; Using Peer Pressure to Fight Cybercrime; Using Technology to Fight Cybercrime; Finding New Ways to Protect Against Cybercrime
,
SummaryFrequently Asked Questions; Resources; Chapter 2 Reviewing the History of Cybercrime; Introduction; Exploring Criminality in the Days of Standalone Computers; Sharing More Than Time; The Evolution of a Word; Understanding Early Phreakers, Hackers, and Crackers; Hacking Ma Bell's Phone Network; Phamous Phreakers; Phreaking on the Other Side of the Atlantic; A Box for Every Color Scheme; From Phreaker to Hacker; Living on the LAN: Early Computer Network Hackers; How BBSs Fostered Criminal Behavior; How Online Services Made Cybercrime Easy
,
Introducing the ARPANet:: the Wild West of NetworkingSputnik Inspires ARPA; ARPA Turns Its Talents to Computer Technology; Network Applications Come into Their Own; The Internetwork Continues to Expand; The ARPANet of the 1980s; The Internet of the 1990s; The Worm Turns-and Security Becomes a Concern; Watching Crime Rise with the Commercialization of the Internet; Bringing the Cybercrime Story Up to Date; Understanding How New Technologies Create New Vulnerabilities; Why Cybercriminals Love Broadband; Why Cybercriminals Love Wireless; Why Cybercriminals Love Mobile Computing
,
Why Cybercriminals Love Sophisticated Web and E-Mail TechnologiesWhy Cybercriminals Love E-Commerce and Online Banking; Why Cybercriminals Love Instant Messaging; Why Cybercriminals Love New Operating Systems and Applications; Why Cybercriminals Love Standardization; Planning for the Future: How to Thwart Tomorrow's Cybercriminal; Summary; Frequently Asked Questions; Resources; Chapter 3 Understanding the People on the Scene; Introduction; Understanding Cybercriminals; Profiling Cybercriminals; Understanding How Profiling Works; Reexamining Myths and Misconceptions About Cybercriminals
,
Constructing a Profile of the Typical Cybercriminal
,
English
Additional Edition:
ISBN 1-932266-33-X
Additional Edition:
ISBN 1-931836-65-5
Language:
English
Bookmarklink