𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cybersecurity and digital forensics : challenges and future paradigms

✍ Scribed by Randal Joyce; Abdulrahman Yarali; Faris Sahawneh


Publisher
Nova Science Publishers
Year
2022
Tongue
English
Leaves
204
Series
Cybercrime and cybersecurity research
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Contents
Preface
Acknowledgments
Chapter 1
Introduction to Cybercrime
Abstract
Introduction
Dynamics of Cybercrime
Types of Cybercrime
Categories of Cybercrime
Phishing
Spam
Hacking
Famous Cybercrime Cases
Cybercrimes Business Impact
Organizational Steps to Prevent Cybercrime
Data Protection Strategy
Data Breach Prevention Strategy
Data Leak Prevention Strategy
Data Protection Process
Effect on National Defense
Guarding against Cyberattack
Investigative Techniques for Cybercrime
Background Check
Information Collecting
Tracking Authors
Digital Forensics
Investigative Cybercrime Agencies
Criminal Justice Agencies
National Security Agencies
Private Security Agencies
Chapter 2
Cybercrimes and Cybercriminals: Mitigating, Minimizing, and Preventing Cybercrimes and Cybersecurity Risks
Abstract
Introduction
Impacts of Cybercrime
Types of Cybercrime
Cyber Extortion
Crypto-Jacking
Identity Theft
Credit Card Fraud
Software Piracy
Cyber Espionage
Advanced Attacks
Distributed DoS (Denial of Service)
Data Compromise
Website Defacement
Website Defacement Prevention
Evade the Use of Default Administration Email and Directory
Always Reduce the Application of Plug-ins and Add-ons
Error Messages
Limit File Uploading to the Websites
Utilize TLS and SSL
Emerging Threats and Issues on Cybercrime
Social Media
Cloud Computing
Smartphones
Security Risks with Smartphones
Concerns over Wi-Fi Connections
Concerns over Bluetooth Connections
Other Vulnerabilities
Cyber-Attacks on Critical Infrastructure
Future Concerns on Cybersecurity
Crypto-Jacking and Crypto Mining
Cyberwarfare
Legislations Concerning Cybercrime
Conclusion
Chapter 3
A Risk-Aware Path to Cyber Security Resilience and Maturity
Abstract
Introduction
A Mindset Reset
Today’s Cyber Security Reality
Due Diligence and Negligence
Operational Efficacy and Efficiency
Security Operations
Withstanding Tomorrow’s Threats
Conclusion
Chapter 4
Security and Privacy Issues in Digital Communications
Abstract
Introduction
Cloud Computing
Wireless Body Area Networks
Radiofrequency Identification (RFID)
Major Security Breaches
Backoff PoS Malware
Conclusion
Chapter 5
National Cyber Security Strategies
Abstract
Introduction
Background
Quantifying Cyber Security
Principal Functions for Strong Security Methodology
Identify
Protect
Detect
Respond
Recover
Cyber-Attacks and Fatalities
Impacts on National Economies
Lessons Learned
Metrics to Assess the Efficiency of Cybersecurity Strategies
Business Perspective
Market Challenges for Cybersecurity
Economic Perspective
The Cybersecurity Industrial Complex
The Malicious Cyber Activity Is Aimed at Banks in the Swift Network
Malicious Cyber Activity Upsetting Financial Markets
Effect of Economies of Cybersecurity on NCSSs
Government Perspective
Cybersecurity and Social Welfare
Cybersecurity as a Public Policy and the Role of the Government
Government Intervention
Causes of Security Breaches and Attacks
Software
Zero-Day Susceptibilities
β€œBackdoor” Access
Firmware
Hardware
Cloud Computing
Recommendations
Conclusion
Chapter 6
Digital Forensics
Abstract
Introduction
Historical Implications
Importance
Forensic Processing
Acquisition of Exhibits
Analysis
Reporting
Phases
Preservation
Collection
Examination
Analysis of Digital Forensics
Scope
Examination Focus
General Nature of Matter
Time Framework
Logical Data
Data Leakage
Scope Limitations
Implementation of Process
Techniques
Live Forensics
Data Recovery
Passcodes Recovery
File Carvings
Filtering of Known Files
Keyword Research
Timeline Analysis
Tools
Software Validity
Open Source vs. Commercial Software
Open-Source Software
Commercial Source Software
Legal Considerations
Digital Evidence
Issues in Digital Evidence
Conclusion
Chapter 7
Mobile Forensics: Concepts, Challenges, and Issues
Abstract
Introduction
Mobile Forensic Acquisition Phases
Issues in Mobile Forensics
Cloud Forensics
Conclusion
Chapter 8
IoT Forensics
Abstract
Introduction
Cyber Security Issues and IoT Forensics
Need for IoT Forensics
Implications of IoT Forensics
Procedural Intimations
IoT Readiness
Preparation
Collection
Examination
Analysis and Reporting of Evidence
IoT Investigation
Preparation
Collection
Examination
Analysis
Reporting of Evidence
Evidence Preservation
Security Provenance
API Evidencing
Taxonomy of IoT Forensics
Phases of Forensics
Evidence Sources
Frameworks
Enablers
Modes of Investigation
Layers of Forensics
IoT Forensics and Sources of Evidence
Smart Devices and Sensors
Hardware Implications
Software Insinuations
External Resources
Opportunities Developed by IoT Forensics
Challenges Developed by IoT Forensics
Challenges Developed during IoT Readiness
Challenges Developed during IoT Investigation
Preparation
Collection
Analysis
Reporting
Conclusion
Chapter 9
Cybersecurity: Trending Issues
Abstract
Introduction
Identity, Privacy, and Trust Management
Malware Research
Forensics Trends
Data and Policy Management
Cybercrime and Underground Technology
Risk Management, Economics, and Regulation
Secure Design, Tooling, and Engineering
Phishing Attacks
IoT Ransomware
Increased Data Privacy Regulation
Cyber Attacks on Mobile Devices
Increased Investment in Automation
Security Automation
Conclusion
Chapter 10
Artificial Intelligence: Cybersecurity and Security Threats
Abstract
Introduction
Cybersecurity in Its Current State
AI as a Concept
AI: A Solution for Cybersecurity
AI: New Challenges in Cybersecurity
Conclusion
References
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Additional Sources
Authors’ Contact Information
Index
Blank Page
Blank Page


πŸ“œ SIMILAR VOLUMES


Cyber Security and Digital Forensics: Ch
✍ Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le πŸ“‚ Library πŸ“… 2022 πŸ› Wiley-Scrivener 🌐 English

<span><b>CYBER SECURITY AND DIGITAL FORENSICS</b> <p><b>Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all

Cyber Security and Digital Forensics: Ch
✍ Sabyasachi Pramanik πŸ“‚ Library πŸ“… 2022 πŸ› Wiley-Scrivener 🌐 English

<b>CYBER SECURITY AND DIGITAL FORENSICS</b> <b>Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these

Exploring Careers in Cybersecurity and D
✍ Lucy K. Tsado, Robert Osgood πŸ“‚ Library πŸ“… 2022 πŸ› Rowman & Littlefield Publishers 🌐 English

<p></p><p><span>Exploring Careers in Cybersecurity and Digital Forensics is a one stop shop for students and advisors, providing information about education, certifications, and tools to guide them in making career decisions within the field. </span></p><p><span>Cybersecurity is a fairly new academi

Exploring Careers in Cybersecurity and D
✍ Lucy K. Tsado, Robert Osgood πŸ“‚ Library πŸ“… 2022 πŸ› Rowman & Littlefield Publishers 🌐 English

<p></p><p><span>Exploring Careers in Cybersecurity and Digital Forensics is a one stop shop for students and advisors, providing information about education, certifications, and tools to guide them in making career decisions within the field. </span></p><p><span>Cybersecurity is a fairly new academi