Chapter 14. Implementing Cybercrime Detection Techniques

Topics we'll investigate in this chapter:

▪ Security Auditing and Log Files
▪ Firewall Logs, Reports, Alarms, and Alerts
▪ Commercial Intrusion Detection Systems
▪ IP Spoofing and Other Antidetection Tactics
▪ Honeypots, Honeynets, and Other “Cyberstings”
Summary
Frequently Asked Questions

Introduction

In the preceding chapter, we turned our focus from an analysis and explanation of cybercrime, who's involved in perpetrating such crimes, and underlying computer and networking security basics to an investigation of what's involved in countering potential threats—namely, we covered various aspects and areas in which it's essential to implement system, network, and communication security. Unfortunately, ...

Get Scene of the Cybercrime, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.