Cyber Crime and Cyber Terrorism


V Volatility, 79–80 Volume boot record (VBR), 82 W



Download 5,67 Mb.
Pdf ko'rish
bet283/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   275   276   277   278   279   280   281   282   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

V
Volatility, 79–80
Volume boot record (VBR), 82
W
Watering Hole attack, 236
Wireless encryption protocol (WEP), 22
Write blockers, 78
X
X1 Social Discovery software, 182
Z
ZeroAccess botnets, 247–249, 248
f
Zeus in the mobile (ZITMO), 244–245
Zeus platform, 233

Document Outline

  • Title Page
  • Copyright
  • Acknowledgments
  • Endorsements
  • Contributors
  • Author Biography
  • Foreword
  • Preface
  • Cyberspace: The new frontier for policing? 
    • The Shape of the Challenge
    • The Size of the Challenge
    • The Response
    • Conclusion
    • References
  • Definitions of Cyber Terrorism
    • Introduction
    • The Confusion About Cyber Terrorism
    • Cyber Terrorism Definition
    • Has Cyber Terrorism ever Occurred?
    • Conclusions
    • References
  • New and emerging threats of cyber crime and terrorism
    • Introduction
    • Some Historic Milestones
    • Cyber security lessons not learned from previous ICT innovation cycles
    • Organizational aspects not learned from previous ICT innovation cycles
    • Emerging threats
    • Conclusions
    • References
  • Police investigation processes: practical tools and techniques for tackling cyber crimes 
    • Introduction
    • Investigative Decision Making
    • Investigative Problem Solving
    • Developing Investigative Hypothesis
    • Investigative Innovation
    • Investigators Contact Management
    • Investigating Crime and Terror
    • Conclusion
    • References
  • Cyber-specifications: capturing user requirements for cyber-security investigations
    • Introduction
    • User Requirements and the Need for a User-Centered Approach?
    • Balancing Technological and Human Capabilities
    • Conducting User Requirements Elicitation
    • Capturing and Communicating User Requirements
    • Conclusion
    • Acknowledgment
    • References
  • High-tech investigations of cyber crime
    • Introduction
    • High-Tech Investigations and Forensics
    • Core Concepts of High-Tech Investigations
    • Digital Landscapes
    • The “Crime Scene”
      • Live and Online Data Capture
      • Offline (Dead) Data Capture
      • Verification of the Data
    • Reviewing the Requirements
    • Starting the Analysis
      • Signature Analysis
      • Filtering Evidence
      • Keyword Searching
    • Core Evidence
      • Windows LNK Files
      • Windows Prefetch Files
      • Windows Event Logs
      • Windows Registry
      • Restore Points
    • Case Study
    • Summary
    • References
  • Seizing, imaging, and analyzing digital evidence: step-by-step guidelines 
    • Introduction
    • Establishing Crime
    • Collecting Evidence for a Search Warrant
    • Reported by a Third Party
    • Identification of a Suspects Internet Protocol Address
    • IP Spoofing
    • Anonymizing Proxy Relay Services
    • Intrusion Detection Systems, Network Traffic and Firewall Logs
    • Interviews with Suspects
    • Analysis of Suspects Media
    • Doxing
    • Collecting Evidence
    • Seizing Equipment
    • Search for Written Passwords
    • Forensic Acquisition
    • Ram
    • Image
    • Forensic Analysis
    • Anti-forensics
    • RAM Analysis
    • Data Carving and Magic Values
    • Media Storage Forensics
      • The Structure and Format of a Hard Drive
    • Partitions
    • Master Boot Record
    • The VBR and BIOS parameter block
    • File System
    • File Table
    • Searching for Evidence
    • Keyword and Phrases Search
    • Recovering Deleted Information
    • Recovering Deleted Files and Folders
    • Recovering Deleted Partitions
    • Where Evidence Hides
    • Registry
    • Most Recently Used Lists
    • Last Write Time
    • Hiberfil.sys
    • Pagefil.sys
    • System Volume Information Folders
    • Chapter Summary
    • References
  • Digital forensics education, training and awareness
    • Introduction
    • Digital Forensics Laboratory Preparation and Training
    • Digital Anti Forensics Tools and Approaches
    • The Main Difficulties Faced by Law Enforcement Officers Fighting Cyber-Crime
    • Educational Provision for the Study of Computer Forensics
    • The CFM Methodology
    • Conclusions
    • References
  • Understanding the situational awareness in cybercrimes: case studies 
    • Introduction
    • Taxonomical Classification of Cybercrime/Cyberterrorism
    • Case Studies
    • Political/Publicity/Self-Actualization: The Case of the Syrian Electronic Army
      • Who Are They?
      • Political or Moral Hackers?
    • Methods: Phishing and DDoS
    • Who Have They Hacked to Date?
      • CNN
      • Angry Birds
      • Microsoft (January 2014)
    • Saudi Arabian Government Websites (January 2014)
    • Social Media Presence
    • The Case of Stuxnet
    • The Cyber-Attacks on Banks
      • On a Global Scale
      • In the UK
    • The Case of the Anonymous Attacks on Scientology
    • Self-Actualization: The Case of “Mafiaboy”
    • Strategic Responses to Cyber Attacks
    • Concluding Remarks
    • References
  • Terrorist use of the internet
    • Terrorist Use of the Internet
    • Propaganda—Indoctrination—Recruitment
    • The Role of the Video
    • Online Forums—Blogs
    • Online Social Network Services
    • Radicalization Process on the Internet
    • Particular case: lone wolf
    • Information Sharing
    • Future Developments
      • Cyber Terrorism
      • Financing
      • Darknet
      • 3D Printing
      • Full VPN
    • Conclusion
    • References
  • ICT as a protection tool against child exploitation
    • Introduction
    • Key Issues And Challenges
    • Information Awareness And Better Education
    • Government Responsibilities And Legal Framework
    • Technical Issues And Challenges
      • A Case Study On Use Of Technology And Proposed Methodology
      • Objectivity, Consistency And Credibility
      • A Systems Approach To Child Protection
    • Child-Centered Information Flows
    • Cbct Response System
    • Conclusions
    • References
  • Cybercrime classification and characteristics
    • Introduction
    • What is Cybercrime?
    • What are the Classifications and Types of Cybercrime?
    • Cybercrime Categories
      • Phishing
      • Spam
      • Hacking
      • Cyber Harassment or Bullying
      • Identity Theft
      • Plastic Card Fraud
      • Internet Auction Fraud
    • Cyber-Attack Methods and Tools
    • Conclusion
    • References
  • Cyber terrorism: Case studies
    • Introduction
    • Case Studies—Activities In Cyberspace Attributed To Terrorist Organizations
    • Analysis Of Capabilities
    • Technological Capabilities, Intelligence Guidance, And Operational Capacity
      • Technological Capabilities
      • Intelligence-Guided Capability
      • Operational Capability
    • Conclusion
    • References
  • Social media and Big Data
    • Introduction
    • Big Data: The Asymmetric Distribution of Control Over Information and Possible Remedies
    • Big Data and Social Surveillance: Public and Private Interplay in Social Control
      • Array of Approved eSurveillance Legislation
      • Forced “On Call” Collaboration by Private Entities
        • Data Collection for Crime Prediction and Prevention
        • Legitimacy
      • Use of Private Sector Tools and Resources
    • The Role of the E.U. Reform on Data Protection in Limiting the Risks of Social Surveillance
    • Preserving the E.U. data protection standard in a globalized world
    • References
  • Social media and its role for LEAs: Review and applications 
    • Introduction
    • Features of Social Media Users and Use
      • Differences in Demographics Across Networks
      • Rationales for Social Media Use
      • Influences on Social Media Behaviors
      • Disclosure and Trustworthiness of Information
      • Relevance to LEAs
    • LEA Usage Scenarios for Social Media
      • Social Media in “Lone-Wolf” Scenarios for Early Assessment and Identification of Threats
      • Social Media-Based Approach in a Hostage Scenario
      • Organized Crime Social Media Data Analysis
      • Crowd-Sourcing with a Collective Intelligence Platform
      • Application of Social Media in Human Trafficking Scenarios
      • Public Engagement on Social Media
      • From Social Media to LEA Intelligence
    • Concluding Remarks
    • References
  • The rise of cyber liability insurance
    • A Brief History of Insurance
    • Business Interruption Insurance
    • What is Cyber Liability?
      • First-Party Cyber Liability
      • Third-Party Cyber Liability
    • Cyber Risks—A Growing Concern
    • The Cyber Threat
    • A Changing Regulatory Landscape
    • ICO Notification
    • What Does Cyber Liability Insurance Cover?
    • Who Offers Cyber Liability Insurance and What Should Customers Look Out For?
    • Conclusion
  • Responding to cyber crime and cyber terrorism—botnets an insidious threat
    • Introduction
    • A Botnet Roadmap
      • Primary Activities:
      • Support Activities:
    • Botnets How Do They Work. Network Topologies and Protocols
    • Case Study—Eurograbber (2012)
      • The Infection
      • The Money Theft
    • Case Study—ZeroAccess (2013)
    • Countermeasures for Fighting Botnets or Mitigating Botnets Effects
    • Conclusion and Future Trends (TOR, Mobile and Social Networks)
    • References
  • Evolution of tetra through the integration with a number of communication platforms to support public protection an
    • Introduction
      • TETRA Technology
      • Current Trends of PPDR (i.e., TETRA) Technology
    • Technological and Economic Barriers and Issues
    • Progress Beyond the State-of-the-Art
      • Current PPDR Communication Network Architecture Landscape
      • State-of-the-Art on Mobile Communication Standard
        • General PMR standards
        • Tetrapol
        • Gsm
        • Tetra
    • Proposed PPDR Communication Network Architectural Solutions
      • TETRA over Mobile IP Network
        • Multi-technology communication mobile IP gateway (MIPGATE)
        • Multipath TCP
        • Security
      • TETRA over Mobile Ad-Hoc Network
      • TETRA over DVB-T/DTTV Network
    • Conclusion
    • References
  • Index
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • L
    • M
    • N
    • O
    • P
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Z

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   275   276   277   278   279   280   281   282   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish