You are previewing New Threats and Countermeasures in Digital Crime and Cyber Terrorism.
O'Reilly logo
New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Book Description

Technological advances, although beneficial and progressive, can lead to vulnerabilities in system networks and security. While researchers attempt to find solutions, negative uses of technology continue to create new security threats to users. New Threats and Countermeasures in Digital Crime and Cyber Terrorism brings together research-based chapters and case studies on security techniques and current methods being used to identify and overcome technological vulnerabilities with an emphasis on security issues in mobile computing and online activities. This book is an essential reference source for researchers, university academics, computing professionals, and upper-level students interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Foreword
  6. Preface
    1. ORGANIZATION OF THIS BOOK
  7. Chapter 1: A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
    1. ABSTRACT
    2. INTRODUCTION
    3. MOBILE NETWORKS
    4. DIGITAL CURRENCY
    5. CYBER ESPIONAGE AND SECRECY
    6. OPEN SOURCE INTELLIGENCE (OSINT) AND OPEN SOURCE SOFTWARE (OSS)
    7. LAWS AND POLICIES TO COMBAT TERRORISM
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  8. Chapter 2: Mobile Devices
    1. ABSTRACT
    2. INTRODUCTION
    3. METHODOLOGY
    4. RESEARCH RESULTS
    5. ANALYSIS AND DISCUSSION
    6. LIMITATIONS
    7. CONCLUSION AND SUGGESTIONS
    8. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  9. Chapter 3: Security Threats on Mobile Devices
    1. ABSTRACT
    2. INTRODUCTION
    3. APPLICATION-BASED MOBILE THREATS
    4. DEFENSIVE STRATEGIES
    5. BROWSER SECURITY
    6. SECURING ANDROID FOR THE ENTERPRISE ENVIRONMENT
    7. RECOMMENDED SECURITY PRACTICES FOR MOBILE DEVICES
    8. CONCLUSION
    9. REFERENCES
    10. KEY-TERMS AND DEFINITIONS
  10. Chapter 4: The Human Factor in Mobile Phishing
    1. ABSTRACT
    2. INTRODUCING PHISHING
    3. INTRODUCING MOBILE PHISHING
    4. THE NEED TO STUDY MOBILE PHISHING
    5. THE NEED TO STUDY SMISHING IN PARTICULAR
    6. INTRODUCING NON-HUMAN FACTORS AFFECTING PHISHING
    7. INTRODUCING HUMAN FACTORS AFFECTING PHISHING
    8. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  11. Chapter 5: Security Issues in Mobile Wireless Ad Hoc Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. 5.1 SECURITY THREAT ASPECTS AND DESIGN CHALLENGES OF MOBILE AD HOC NETWORKS
    4. 5.2 DETAILED COMPARATIVE ANALYSIS OF EXISTING METHODS AND TECHNIQUES OF IMPLEMENTING SECURITY IN MANETs
    5. 5.3 PREVIOUS STUDIES ON SECURING MANETs AGAINST DoS AND DDoS ATTACKS
    6. 5.4 SECURITY STRATEGIES AGAINST DoS AND DDoS ATTACKS ON MOBILE AD HOC NETWORKS
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  12. Chapter 6: Legal Issues
    1. ABSTRACT
    2. LEGAL BACKGROUND
    3. INDUSTRY-SPECIFIC LAWS
    4. CURRENT CYBER-SECURITY EFFORTS ANDTHREATS
    5. FEDERAL EFFORTS
    6. STATE EFFORTS
    7. PROPOSED REGULATIONS
    8. MODEL NATIONAL POLICY
    9. GOVERNMENT TECHNICAL GUIDANCE
    10. CONCLUSION
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  13. Chapter 7: Survey in Smartphone Malware Analysis Techniques
    1. ABSTRACT
    2. INTRODUCTION
    3. TAXONOMY OF SMARTPHONE MALWARE DETECTION
    4. TAXONOMY OF FEATURES EXTRACTION
    5. CONCLUSION
    6. REFERENCES
    7. KEY TERMS AND DEFINITIONS
  14. Chapter 8: Trust Management in Mobile Ad Hoc Networks for QoS Enhancing
    1. ABSTRACT
    2. INTRODUCTION
    3. TRUST MANAGEMENT MODEL
    4. DEALING WITH COLLUSION ATTACK
    5. SIMULATION AND DISCUSSION
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  15. Chapter 9: Insider Threats
    1. ABSTRACT
    2. INTRODUCTION AND BACKGROUND
    3. EXAMPLES OF MALICIOUS INSIDER THREAT INCIDENTS AND THEIR IMPACT
    4. MOTIVES AND TECHNIQUES USED FOR CARRYING OUT INSIDER ATTACKS: HUMAN AND BEHAVIORAL ISSUES
    5. CONCLUSION
    6. REFERENCES
    7. KEY TERMS AND DEFINITIONS
  16. Chapter 10: Authorship Analysis
    1. ABSTRACT
    2. INTRODUCTION
    3. PROCEDURES OF AUTHORSHIP ANALYSIS
    4. CHALLENGES IN AUTHORSHIP ANALYSIS
    5. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
    7. REFERENCES
    8. ADDITIONAL READING
    9. KEY TERMS AND DEFINITIONS
  17. Chapter 11: The Need for a Dualist Application of Public and Private Law in Great Britain Following the Use of “Flame Trolling” During the 2011 UK Riots
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. LIMITATIONS IN THE BRITISH LEGAL SYSTEM FOR DEALING WITH COMPUTER-RELATED CRIME
    5. THE NEED FOR A DUALIST REFORM OF THE BRITISH LEGAL SYSTEMS
    6. THE ROLE OF LAW OF TORTS IN SUPPLEMENTING PUBLIC LAW FOR A DECRIMINALISED SOCIETY
    7. THE ROLE OF GAMIFICATION TO UNDERSTAND PRE-LEGAL INTERVENTIONS
    8. IMPLICATIONS AND FUTURE RESEARCH DIRECTIONS
    9. DISCUSSION
    10. ACKNOWLEDGMENT
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  18. Chapter 12: Native Language Identification (NLID) for Forensic Authorship Analysis of Weblogs
    1. ABSTRACT
    2. 1. BACKGROUND
    3. 2. NLID STUDY
    4. 3. NLID FOR CASEWORK / APPLICATION AND FUTURE
    5. REFERENCES
    6. KEY TERMS AND DEFINITIONS
    7. ENDNOTE
  19. Chapter 13: The Critical Need for Empowering Leadership Approaches in Managing Health Care Information Security Millennial Employees in Health Care Business and Community Organizations
    1. ABSTRACT
    2. INTRODUCTION
    3. REFERENCES
  20. Chapter 14: Learning Management Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. WHAT IS THE LEARNING MANAGEMENT SYSTEM ABOUT?
    4. BENEFITS AND VALUE OF THE LEARNING MANAGEMENT SYSTEM TO A TECHNOLOGY STRATEGY
    5. BROWSER NEUTRALITY, THE LMS, AND SECURITY
    6. COMPONENTS OF THE LMS AND THEIR VULNERABILITIES
    7. SOFTWARE AS A SERVICE A PHENOMENON
    8. OPERATIONAL SUSTAINABILITY AND THE LEARNING MANAGEMENT SYSTEM
    9. DISCUSSION AND CONCLUSION
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  21. Chapter 15: The Innovation and Promise of STEM-Oriented Cybersecurity Charter Schools in Urban Minority Communities in the United States as a Tool to Create a Critical Business Workforce
    1. ABSTRACT
    2. INTRODUCTION
    3. GROWTH OF CHARTER SCHOOLS IN THE US
    4. CURRICULUM FRAMEWORKS
    5. EDUCATIONAL AND LEADERSHIP DEVELOPMENT RAMIFICATIONS
    6. THE ORIENTATION OF THE FOUNDERS AND LEADERS
    7. THE PUBLIC SCHOOL STRATEGY
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  22. Chapter 16: Communication, Technology, and Cyber Crime in Sub-Saharan Africa
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. SOLUTIONS AND RECOMMENDATIONS
    5. CONCLUSION
    6. REFERENCES
    7. KEY TERMS AND DEFINITIONS
    8. APPENDIX 1
    9. APPENDIX 2
    10. APPENDIX 4
  23. Related References
  24. Compilation of References
  25. About the Contributors