You are previewing Combating Security Breaches and Criminal Activity in the Digital Sphere.
O'Reilly logo
Combating Security Breaches and Criminal Activity in the Digital Sphere

Book Description

With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. Featuring law enforcement perspectives, theoretical foundations, and forensic methods, this book is ideally designed for policy makers, analysts, researchers, technology developers, and upper-level students.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  6. Preface
    1. OVERVIEW
  7. Section 1: Digital Sphere Threats and Vulnerabilities
    1. Chapter 1: A Review on Digital Sphere Threats and Vulnerabilities
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. DIGITAL SPHERE ISSUES
      5. 4. SECURITY THREATS
      6. 5. SECURITY VULNERABILITIES
      7. 6. SECURITY ATTACKS
      8. 7. FUTURE WORK
      9. 8. CONCLUSION
      10. REFERENCES
      11. KEY TERMS AND DEFINITIONS
    2. Chapter 2: Advances in Biometrics for Secure Human Authentication System
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUTURE RESEARCH DIRECTIONS
      5. CONCLUSION
      6. REFERENCES
      7. KEY TERMS AND DEFINITIONS
    3. Chapter 3: Against Spoofing Attacks in Network Layer
      1. ABSTRACT
      2. INTRODUCTION
      3. VARIOUS SPOOFING ATTACKS
      4. DEFENSE SCHEMES FOR NETWORK LAYER SPOOFING
      5. CONCLUSION
      6. REFERENCES
    4. Chapter 4: Classification of Cybercrimes and Punishments under the Information Technology Act, 2000
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. LAWS RELATED TO CYBER CRIMES IN INDIA
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FURTHER RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
  8. Section 2: Techniques for Combating Security Breaches
    1. Chapter 5: Cloud Crime and Fraud
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SECURITY AND PRIVACY ISSUES
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    2. Chapter 6: Combating Cyber Security Breaches in Digital World Using Misuse Detection Methods
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. DATA SET USED IN THIS RESEARCH
      5. 4. PROPOSED MODEL FOR MISUSE DETECTION SYSTEM
      6. 5. CLASSIFICATION RESULTS
      7. 6. COMPARISON OF PERFORMANCE
      8. 7. CONCLUSION AND FUTURE WORK
      9. REFERENCES
    3. Chapter 7: Critical Video Surveillance and Identification of Human Behavior Analysis of ATM Security Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. FUNDAMENTAL ELEMENTS IN VIDEO TRACKING
      4. TRACKING AND PEOPLE COUNTING SYSTEM
      5. TRACKING AND COUNTING SYSTEM ARCHITECTURE
      6. CASE STUDY
      7. CONCLUSION
      8. REFERENCES
      9. KEY TERMS AND DEFINITIONS
    4. Chapter 8: Digital Evidence in Practice
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. CLASSIFICATION OF DIGITAL EVIDENCE
      4. 3. COLLECTION OF DIGITAL EVIDENCE
      5. 4. VALIDATION OF DIGITAL EVIDENCE
      6. 5. PRESERVING THE DIGITAL EVIDENCE
      7. 6. TOOLS
      8. 7. STANDARDS FOR THE EXCHANGE OF DIGITAL EVIDENCE
      9. 8. CONCLUSION
      10. REFERENCES
  9. Section 3: Cyber Forensics and Investigation
    1. Chapter 9: Digital Forensic and Machine Learning
      1. ABSTRACT
      2. INTRODUCTION TO FORENSIC COMPUTING
      3. NEED FOR DIGITAL FORENSIC
      4. DIGITAL FORENSIC TOOLS
      5. TYPES OF FORENSIC HARDWARE
      6. DIGITAL FORENSIC INVESTIGATION SOFTWARE TOOLS
      7. MACHINE LEARNING
      8. DIGITAL FORENSIC AND MACHINE LEARNING
      9. SOLUTION
      10. A SUMMARIZED WORKFLOW OF THE METHODOLOGY
      11. CONCLUSION AND FUTURE WORK
      12. REFERENCES
    2. Chapter 10: Effective Recognition of Stereo Image Concealed Media of Interpolation Error with Difference Expansion
      1. ABSTRACT
      2. INTRODUCTION
      3. INTERPOLATION AND REVERSIBLE DATA HIDING
      4. BACKGROUND
      5. PROPOSED STEGANALYSIS ALGORITHM
      6. EXPERIMENTAL RESULTS
      7. CONCLUSION
      8. REFERENCES
    3. Chapter 11: Mobile Malware
      1. ABSTRACT
      2. INTRODUCTION
      3. OWASP TOP 10 MOBILE RISKS OF 2015
      4. WIRELESS AND APPLICATION ATTACK TYPES
      5. BASIC FORENSIC PROCEDURE
      6. SIGNS OF MALWARE
      7. MALWARE ANALYSIS
      8. MITIGATION AND DETERRENT TECHNIQUES
      9. REFERENCES
    4. Chapter 12: Network Intrusion Detection and Prevention Systems on Flooding and Worm Attacks
      1. ABSTRACT
      2. INTRODUCTION TO NETWORK ATTACKS
      3. CLASSIFICATION OF ATTACKS
      4. OBJECTIVES OF DETECTION MECHANISMS FOR NETWORK SECURITY
      5. RELATED WORKS AND LITERATURE SURVEY
      6. DETECTING THE SOURCE OF TCP SYN FLOOD ATTACK
      7. ISSUES IN EXISTING TECHNIQUES
      8. PROPOSED SOLUTION TO DETECT THE SOURCE OF TCP SYN FLOOD ATTACK
      9. COMPARISON WITH EXISTING TECHNIQUES
      10. NETWORK INTRUSION PREVENTIVE STRATEGIES: FLOODING ATTACKS
      11. CENTRALIZED WORM DETECTOR (CWD) TECHNIQUE
      12. TWO FISH ALGORITHM
      13. CENTRALISED WORM DETECTOR (CWD) TECHNIQUE IMPLEMENTATION
      14. COMPARISON WITH THE EXISTING TECHNIQUES
      15. NETWORK INTRUSION PREVENTION STRATEGIES: WORM ATTACKS
      16. SUMMARY AND CONCLUSION
      17. REFERENCES
  10. Section 4: Visual Information Security
    1. Chapter 13: A Systematic Mapping of Security Mechanisms
      1. ABSTRACT
      2. INTRODUCTION
      3. INTERNET INFRASTRUCTURE ATTACKS
      4. ATTACK MOTIVATIONS
      5. ATTACK CLASSIFICATION
      6. CONCLUSION
      7. REFERENCES
    2. Chapter 14: Understanding Anti-Forensics Techniques for Combating Digital Security Breaches and Criminal Activity
      1. ABSTRACT
      2. INTRODUCTION
      3. NETWORK ANTI-FORENSICS
      4. HARD DISK ANTI-FORENSICS
      5. HARD DISKS WIPE
      6. HARD DISK PHYSICAL DESTRUCTION
      7. STEGANOGRAPHY
      8. REFERENCES
    3. Chapter 15: Visual Cryptography for Securing Images in Cloud
      1. ABSTRACT
      2. INTRODUCTION
      3. VISUAL CRYPTOGRAPHY
      4. RANDOM GRID BASED VISUAL CRYPTOGRAPHY
      5. SEGMENT-BASED VISUAL CRYPTOGRAPHY
      6. MULTIPLE IMAGE VISUAL CRYPTOGRAPHY (MIVC)
      7. EXTENDED VISUAL CRYPTOGRAPHY SYSTEM (EVCS)
      8. VISUAL CRYPTOGRAPHY FOR GRAYSCALE AND COLOR IMAGES USING HALFTONING TECHNIQUES
      9. PROGRESSIVE VISUAL CRYPTOGRAPHY
      10. VISUAL CRYPTOGRAPHY USING CHAOTIC MAPPING
      11. CONCLUSION
      12. REFERENCES
      13. KEY TERMS AND DEFINITIONS
    4. Chapter 16: Visual Sensor Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. VSN APPLICATIONS
      4. FUTURE OF SECURITY IN VSN
      5. CONCLUSION
      6. REFERENCES
      7. ADDITIONAL READING
      8. KEY TERMS AND DEFINITIONS
  11. Compilation of References
  12. About the Contributors