Cyber CrimeScientific e-Resources, Nov 7, 2018 - 308 pages Cyber Crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, Cyber Crime has assumed rather sinister implications. Cyber Crime poses great challenges for law enforcement and for society in general. To understand why this is true, it is necessary to understand why, and how, cybercrime differs from traditional, terrestrial crime. Net-crime refers to criminal use of the Internet. Cyber-crimes are essentially a combination of these two elements and can be best defined as "e;Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly using modern telecommunication networks such as the Internet (Chat rooms, e-mails, notice boards and groups) and mobile phones (SMS/MMS)"e;. Since Cyber Crime is a newly specialized field, growing in cyber laws, there is absolutely no comprehensive law on Cyber Crime anywhere in the world. This is precisely the reason why investigating agencies are finding cyberspace to be an extremely difficult terrain to handle. This book explores technical, legal, and social issues related to Cyber Crime. Cyber Crime is a broad term that includes offences where a computer may be the target, crimes where a computer may be a tool used in the commission of an existing offence, and crimes where a computer may play a subsidiary role such as offering evidence for the commission of an offence. |
Contents
19 | |
Classification of Software | 39 |
Structure of The Processor | 45 |
Computer Forensics Basics | 52 |
Computer Forensics in Criminal Investigations | 61 |
A Review of UK Computer Crime Legislation | 84 |
Challenges for Legal Frameworks for Hacking by Law Enforcement | 92 |
Data and Evidence Recovery | 142 |
Solutions to Tackle Cyber | 204 |
Targeted Attacks | 216 |
Intellectual Property Right | 227 |
Legal Aspects of Computing | 233 |
Social Engineering Security | 246 |
Email Bomb | 254 |
Cyber Forensics Investigation | 258 |
Bibliography | 288 |
Common terms and phrases
activities agencies analysis applications attacks botnet button child pornography communication computer crime computer forensic investigation computer forensics computer system conduct court created credit card criminal Cyber Crime Cyber law cyberbullying cybercrime cybercriminals cybersecurity cyberstalking cyberterrorism damage data recovery database deleted detect developed devices digital evidence digital forensics documents electronic electronic discovery encryption example exploit federal file system firewall fraud hackers harassment hard disk hard drive hardware identity theft illegal individuals infected information security information technology intellectual property internet pornography involved keyboard law enforcement legislation machine malicious malware memory messages mouse offence operating system organization password personal information phishing programmes protection R-Studio Agent recover sector server Skype social engineering spam stalking statutes storage stored target terrorist threats users victims virus viruses websites Windows Windows registry