V
Volatility, 79–80
Volume boot record (VBR), 82
W
Watering Hole attack, 236
Wireless encryption protocol (WEP), 22
Write blockers, 78
X
X1 Social Discovery software, 182
Z
ZeroAccess botnets, 247–249, 248
f
Zeus in the mobile (ZITMO), 244–245
Zeus platform, 233
Document Outline - Title Page
- Copyright
- Acknowledgments
- Endorsements
- Contributors
- Author Biography
- Foreword
- Preface
- Cyberspace: The new frontier for policing?
- The Shape of the Challenge
- The Size of the Challenge
- The Response
- Conclusion
- References
- Definitions of Cyber Terrorism
- Introduction
- The Confusion About Cyber Terrorism
- Cyber Terrorism Definition
- Has Cyber Terrorism ever Occurred?
- Conclusions
- References
- New and emerging threats of cyber crime and terrorism
- Introduction
- Some Historic Milestones
- Cyber security lessons not learned from previous ICT innovation cycles
- Organizational aspects not learned from previous ICT innovation cycles
- Emerging threats
- Conclusions
- References
- Police investigation processes: practical tools and techniques for tackling cyber crimes
- Introduction
- Investigative Decision Making
- Investigative Problem Solving
- Developing Investigative Hypothesis
- Investigative Innovation
- Investigators Contact Management
- Investigating Crime and Terror
- Conclusion
- References
- Cyber-specifications: capturing user requirements for cyber-security investigations
- Introduction
- User Requirements and the Need for a User-Centered Approach?
- Balancing Technological and Human Capabilities
- Conducting User Requirements Elicitation
- Capturing and Communicating User Requirements
- Conclusion
- Acknowledgment
- References
- High-tech investigations of cyber crime
- Introduction
- High-Tech Investigations and Forensics
- Core Concepts of High-Tech Investigations
- Digital Landscapes
- The “Crime Scene”
- Live and Online Data Capture
- Offline (Dead) Data Capture
- Verification of the Data
- Reviewing the Requirements
- Starting the Analysis
- Signature Analysis
- Filtering Evidence
- Keyword Searching
- Core Evidence
- Windows LNK Files
- Windows Prefetch Files
- Windows Event Logs
- Windows Registry
- Restore Points
- Case Study
- Summary
- References
- Seizing, imaging, and analyzing digital evidence: step-by-step guidelines
- Introduction
- Establishing Crime
- Collecting Evidence for a Search Warrant
- Reported by a Third Party
- Identification of a Suspects Internet Protocol Address
- IP Spoofing
- Anonymizing Proxy Relay Services
- Intrusion Detection Systems, Network Traffic and Firewall Logs
- Interviews with Suspects
- Analysis of Suspects Media
- Doxing
- Collecting Evidence
- Seizing Equipment
- Search for Written Passwords
- Forensic Acquisition
- Ram
- Image
- Forensic Analysis
- Anti-forensics
- RAM Analysis
- Data Carving and Magic Values
- Media Storage Forensics
- The Structure and Format of a Hard Drive
- Partitions
- Master Boot Record
- The VBR and BIOS parameter block
- File System
- File Table
- Searching for Evidence
- Keyword and Phrases Search
- Recovering Deleted Information
- Recovering Deleted Files and Folders
- Recovering Deleted Partitions
- Where Evidence Hides
- Registry
- Most Recently Used Lists
- Last Write Time
- Hiberfil.sys
- Pagefil.sys
- System Volume Information Folders
- Chapter Summary
- References
- Digital forensics education, training and awareness
- Introduction
- Digital Forensics Laboratory Preparation and Training
- Digital Anti Forensics Tools and Approaches
- The Main Difficulties Faced by Law Enforcement Officers Fighting Cyber-Crime
- Educational Provision for the Study of Computer Forensics
- The CFM Methodology
- Conclusions
- References
- Understanding the situational awareness in cybercrimes: case studies
- Introduction
- Taxonomical Classification of Cybercrime/Cyberterrorism
- Case Studies
- Political/Publicity/Self-Actualization: The Case of the Syrian Electronic Army
- Who Are They?
- Political or Moral Hackers?
- Methods: Phishing and DDoS
- Who Have They Hacked to Date?
- CNN
- Angry Birds
- Microsoft (January 2014)
- Saudi Arabian Government Websites (January 2014)
- Social Media Presence
- The Case of Stuxnet
- The Cyber-Attacks on Banks
- On a Global Scale
- In the UK
- The Case of the Anonymous Attacks on Scientology
- Self-Actualization: The Case of “Mafiaboy”
- Strategic Responses to Cyber Attacks
- Concluding Remarks
- References
- Terrorist use of the internet
- Terrorist Use of the Internet
- Propaganda—Indoctrination—Recruitment
- The Role of the Video
- Online Forums—Blogs
- Online Social Network Services
- Radicalization Process on the Internet
- Particular case: lone wolf
- Information Sharing
- Future Developments
- Cyber Terrorism
- Financing
- Darknet
- 3D Printing
- Full VPN
- Conclusion
- References
- ICT as a protection tool against child exploitation
- Introduction
- Key Issues And Challenges
- Information Awareness And Better Education
- Government Responsibilities And Legal Framework
- Technical Issues And Challenges
- A Case Study On Use Of Technology And Proposed Methodology
- Objectivity, Consistency And Credibility
- A Systems Approach To Child Protection
- Child-Centered Information Flows
- Cbct Response System
- Conclusions
- References
- Cybercrime classification and characteristics
- Introduction
- What is Cybercrime?
- What are the Classifications and Types of Cybercrime?
- Cybercrime Categories
- Phishing
- Spam
- Hacking
- Cyber Harassment or Bullying
- Identity Theft
- Plastic Card Fraud
- Internet Auction Fraud
- Cyber-Attack Methods and Tools
- Conclusion
- References
- Cyber terrorism: Case studies
- Introduction
- Case Studies—Activities In Cyberspace Attributed To Terrorist Organizations
- Analysis Of Capabilities
- Technological Capabilities, Intelligence Guidance, And Operational Capacity
- Technological Capabilities
- Intelligence-Guided Capability
- Operational Capability
- Conclusion
- References
- Social media and Big Data
- Introduction
- Big Data: The Asymmetric Distribution of Control Over Information and Possible Remedies
- Big Data and Social Surveillance: Public and Private Interplay in Social Control
- Array of Approved eSurveillance Legislation
- Forced “On Call” Collaboration by Private Entities
- Data Collection for Crime Prediction and Prevention
- Legitimacy
- Use of Private Sector Tools and Resources
- The Role of the E.U. Reform on Data Protection in Limiting the Risks of Social Surveillance
- Preserving the E.U. data protection standard in a globalized world
- References
- Social media and its role for LEAs: Review and applications
- Introduction
- Features of Social Media Users and Use
- Differences in Demographics Across Networks
- Rationales for Social Media Use
- Influences on Social Media Behaviors
- Disclosure and Trustworthiness of Information
- Relevance to LEAs
- LEA Usage Scenarios for Social Media
- Social Media in “Lone-Wolf” Scenarios for Early Assessment and Identification of Threats
- Social Media-Based Approach in a Hostage Scenario
- Organized Crime Social Media Data Analysis
- Crowd-Sourcing with a Collective Intelligence Platform
- Application of Social Media in Human Trafficking Scenarios
- Public Engagement on Social Media
- From Social Media to LEA Intelligence
- Concluding Remarks
- References
- The rise of cyber liability insurance
- A Brief History of Insurance
- Business Interruption Insurance
- What is Cyber Liability?
- First-Party Cyber Liability
- Third-Party Cyber Liability
- Cyber Risks—A Growing Concern
- The Cyber Threat
- A Changing Regulatory Landscape
- ICO Notification
- What Does Cyber Liability Insurance Cover?
- Who Offers Cyber Liability Insurance and What Should Customers Look Out For?
- Conclusion
- Responding to cyber crime and cyber terrorism—botnets an insidious threat
- Introduction
- A Botnet Roadmap
- Primary Activities:
- Support Activities:
- Botnets How Do They Work. Network Topologies and Protocols
- Case Study—Eurograbber (2012)
- The Infection
- The Money Theft
- Case Study—ZeroAccess (2013)
- Countermeasures for Fighting Botnets or Mitigating Botnets Effects
- Conclusion and Future Trends (TOR, Mobile and Social Networks)
- References
- Evolution of tetra through the integration with a number of communication platforms to support public protection an
- Introduction
- TETRA Technology
- Current Trends of PPDR (i.e., TETRA) Technology
- Technological and Economic Barriers and Issues
- Progress Beyond the State-of-the-Art
- Current PPDR Communication Network Architecture Landscape
- State-of-the-Art on Mobile Communication Standard
- General PMR standards
- Tetrapol
- Gsm
- Tetra
- Proposed PPDR Communication Network Architectural Solutions
- TETRA over Mobile IP Network
- Multi-technology communication mobile IP gateway (MIPGATE)
- Multipath TCP
- Security
- TETRA over Mobile Ad-Hoc Network
- TETRA over DVB-T/DTTV Network
- Conclusion
- References
- Index
- A
- B
- C
- D
- E
- F
- G
- H
- I
- J
- L
- M
- N
- O
- P
- R
- S
- T
- U
- V
- W
- X
- Z
Do'stlaringiz bilan baham: |