Cybercrime investigators handbook / (Record no. 208867)

MARC details
000 -LEADER
fixed length control field 05501cam a22003258i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119596301
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119596300
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119596325
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119596327
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119596318
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119596319
040 ## - CATALOGING SOURCE
Transcribing agency CUS
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Edwards, Graeme
245 10 - TITLE STATEMENT
Title Cybercrime investigators handbook /
Statement of responsibility, etc. Graeme Edwards.
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Hoboken, New Jersey :
Name of publisher, distributor, etc. John Wiley & Sons, Inc.,
Date of publication, distribution, etc. [2019]
300 ## - DESCRIPTION
Extent 1 online resource
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Title Page; Copyright; Contents; List of Figures; About the Author; Foreword; Acknowledgments; Chapter 1 Introduction; Chapter 2 Cybercrime Offenses; Potential Cybercrime Offenses; Industrial Espionage; Theft of Information Such as Identities, Staff Files, and Accounts; Computer Hacking to Gain Access to System Resources; Gaining or Exceeding Authorized Access Levels to Obtain Highly Restricted Data; Exploiting Information Security Weaknesses through the Supply Chain, Including Third‐Party Contractors; Stealing Credit Card Data for Selling Online, or Card‐Not‐Present Fraud
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Gaining Access to a System or Device through Malicious SoftwareDamaging the Reputation of a Competitor to Gain a Market Advantage; Changes to Computer Systems or Devices; Vandalism to Prove the Skills of the Attacker; Drive‐by Downloads of Malicious Software; Interfering with Access to a Network; Ransomware; Phishing Attacks and Money Laundering; Business Email Compromise Fraud; Social Engineering Fraud; Cybercrime Case Study; Notes; Chapter 3 Motivations of the Attacker; Common Motivators; Revenge; Opportunity; Greed; Test of Skill; Business Competitor; Professional Criminal
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Issue‐Motivated AttackerGeopolitics; Terrorism; Cybercrime Case Study I; Cybercrime Case Study II; Note; Chapter 4 Determining That a Cybercrime Is Being Committed; Cyber Incident Alerts; Attack Methodologies; Cybercrime Case Study I; Cybercrime Case Study II; Notes; Chapter 5 Commencing a Cybercrime Investigation; Why Investigate a Cybercrime?; The Cyber Investigator; Management Support; Is There a Responsibility to Try to Get the Data Back?; Cybercrime Case Study; Notes; Chapter 6 Legal Considerations When Planning an Investigation; Role of the Law in a Digital Crimes Investigation
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Protecting Digital EvidencePreservation of the Chain of Custody; Protection of Evidence; Legal Implications of Digital Evidence Collection; Cybercrime Case Study; Note; Chapter 7 Initial Meeting with the Complainant; Initial Discussion; Complainant Details; Event Details; Cyber Security History; Scene Details; Identifying Offenses; Identifying Witnesses; Identifying Suspects; Identifying the Modus Operandi of Attack; Evidence: Technical; Evidence: Other; Cybercrime Case Study; Chapter 8 Containing and Remediating the Cyber Security Incident; Containing the Cyber Security Incident
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Eradicating the Cyber Security IncidentNote; Chapter 9 Challenges in Cyber Security Incident Investigations; Unique Challenges; Defining Investigation Boundaries and Management Objectives; Identifying Potential Offenses (Criminal and/or Civil); Identifying Compromised Data and/or Resources; Identifying Suspects and Motivations; Identifying Exploited Vulnerabilities; Securing Evidence; Understanding the Legal Jurisdiction Where the Incident Occurred and the Evidence Exists; Locating Digital Evidence in a Timely Manner; Maintaining the Chain of Evidence across Multiple Jurisdictions
650 #0 - SUBJECT
Keyword Computer crimes
650 #7 - SUBJECT
Keyword Computer crimes
856 40 - ONLINE RESOURCES
url https://doi.org/10.1002/9781119596318
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Home library Current library Accession number Koha item type
Central Library, Sikkim University Central Library, Sikkim University E-2943 e-Books
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha