You are previewing Cyber Security, Cyber Crime and Cyber Forensics.
O'Reilly logo
Cyber Security, Cyber Crime and Cyber Forensics

Book Description

Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime, and cyber forensics.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Preface
    1. INTRODUCTION
    2. INTENDED AUDIENCE & USE
    3. CHAPTER SUMMARIES
    4. Concluding Remarks
  5. Acknowledgment
  6. Section 1: Cyber-Crime: Policies and Implications
    1. Chapter 1: The UID Project
      1. Abstract
      2. 1 Introduction
      3. 2 Social Security Number (SSN) in the US
      4. 3 National Identity Card and National Identity Registry in UK
      5. 4 National ID in European Union (EU) Countries
      6. 5 Challenges Anticipated in UID in India
      7. 6. Recommendations
      8. 7. Conclusion
    2. Chapter 2: Combined Impact of Outsourcing and Hard Times on BPO Risk and Security
      1. Abstract
      2. Introduction
      3. Risks of Outsourcing
      4. Risks of Economic Distress
      5. Risks Due to Outsourcing and Economic Distress
      6. Outsourcing Risks and their Mitigation
      7. Conclusion
    3. Chapter 3: A Comparison of Cyber-Crime Definitions in India and the United States
      1. ABSTRACT
      2. Introduction
      3. Cyber Crime
      4. Victims
      5. Cyber Law
      6. Comparison of Legal Provisions for Cybercrime in India and the US
      7. Conclusion
    4. Chapter 4: Emergency Response to Mumbai Terror Attacks
      1. Abstract
      2. Introduction
      3. Background
      4. Literature Review
      5. Mumbai Terror Attacks 26/11
      6. Analysis using Activity Theory
      7. Conclusion
    5. Chapter 5: Pirates of the Copyright and Cyberspace
      1. Abstract
      2. Introduction
      3. Overview of the Issues Involved
      4. Analysis
      5. Conclusion
  7. Section 2: Cyber-Security: Technology Review
    1. Chapter 6: Classifying Host Anomalies
      1. Abstract
      2. 1. INTRODUCTION
      3. 2. Background
      4. 3. The Proposed System
      5. 4. Anomaly Detection Ontology
      6. 5. Results and Discussion
      7. 6. Conclusion and Future Work
    2. Chapter 7: Securing Next Generation Internet Services
      1. Abstract
      2. 1. Introduction
      3. 2. Next Generation Internet (NGI)
      4. 3. Security Issues in Next Generation Internet
      5. 4. Next Generation Internet Services
      6. 5. Cloud Computing
      7. 6. Security Challenges for Services in the Cloud
      8. 7. Security Requirement Analysis for Cloud-Ready Services
      9. 8. Security Design for Cloud-ready Services
      10. 9. Construction of NGI Secured Services
      11. 10. Security Testing for Cloud-Ready Services
      12. 11. Secured Deployment
    3. Chapter 8: An Examination of Identity Management Models in an Internet Setting
      1. Abstract
      2. 1. Introduction
      3. 2. Preliminaries
      4. 3. The Traditional Model
      5. 4. The Omnipresent Authority Model
      6. 5. The Certificate Authority Model
      7. 6. The Identity Management Model
      8. 7. Security Aspects of the Model
      9. 8. Other Considerations for this Model
      10. 9. Summary
    4. Chapter 9: Securing Cloud Environment
      1. Abstract
      2. 1 Introduction
      3. 2. Architecture
      4. 3. Cloud Computing Challenges
      5. 4. Secure Architecture Model
      6. Conclusion
    5. Chapter 10: DoS Attacks in MANETs
      1. Abstract
      2. Introduction
      3. 1. Denial of Service (DoS)
      4. 2. Physical Layer
      5. 3. Media Access Control Layer
      6. 4. Network Layer
      7. 6. Conclusion
    6. Chapter 11: Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks
      1. ABSTRACT
      2. Introduction
      3. 2 Related Work, Assumptions, Technique Overview
      4. 3 Report Formats: Design Considerations
      5. 4 Report Verification At BS
      6. 5 Proofs
      7. 7 Security Analysis
      8. 8 Experimental Results
      9. Conclusion
    7. Chapter 12: Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic
      1. ABSTRACT
      2. 1. Introduction
      3. 2. Traffic Capture
      4. 3. Extended Time Machine Design
      5. 4. Performance Evaluation
      6. 5. Conclusion
    8. Chapter 13: Metamorphic Malware Analysis and Detection Methods
      1. ABSTRACT
      2. 1. Early Malware
      3. 2 Malware Evolution
      4. 4 Anatomy of Metamorphic Viruses
      5. 5 Metamorphic Techniques
      6. 6 Malware Detection Methods
      7. 8 Static Code Analysis using Longest Common Subsequence
      8. 9 Concluding Remarks
  8. Section 3: Cyber-Security: Methods and Algorithms
    1. Chapter 14: Towards Checking Tampering of Software
      1. Abstract
      2. 1 INTRODUCTION
      3. 2 TECHNIQUES FOR DETECTING SOFTWARE TAMPERING
      4. 3 CAPTURING PROGRAM CHARACTERISTICS THROUGH BIRTHMARKS
      5. 4 CONCLUSION
    2. Chapter 15: Complexity Measures of Cryptographically Secure Boolean Functions
      1. Abstract
      2. 1. INTRODUCTION
      3. 2. BOOLEAN FUNCTIONS
      4. 3. COMPLEXITY CRITERION FOR BOOLEAN FUNCTIONS
      5. 4. BOUNDS AND RELATIONS ON VARIOUS COMPLEXITY MEASURES: BOUNDS ON NONLINEARITY
      6. CONCLUSION
    3. Chapter 16: Einstein-Podolsky-Rosen Paradox and Certain Aspects of Quantum Cryptology with Some Applications
      1. Abstract
      2. INTRODUCTION
      3. WHAT IS QUANTUM CRYPTOLOGY?
      4. THE EPR PARADOX
      5. APPLICATIONS OF QC
      6. CONCLUDING REMARKS
    4. Chapter 17: Error Linear Complexity Measures of Binary Multisequences
      1. Abstract
      2. INTRODUCTION
      3. CONCLUSION
      4. Appendix A
      5. Appendix B
      6. Appendix C
    5. Chapter 18: A Survey on Digital Image Steganographic Methods
      1. Abstract
      2. 1. GENERIC EMBEDDING AND EXTRACTING SCHEME
      3. 3. TRANSFORM DOMAIN EMBEDDING TECHNIQUES
      4. 4. CONCLUSION
  9. Compilation of References
  10. About the Contributors
  11. Index