Cyber Crime and cyber terrorism have become the most critical and challenging issues not only within specific countries but across the world [1]. Both have reached a stage where wars can be won by cyber attacks, and not necessarily only on the battlefield [2]. Hence, both police who normally maintain law and order within the state and soldiers who protect the country should have expertise in handling cyber attacks. Development of a cyber army is the real need of the hour.
This edited volume on cyber crime and cyber terrorism provides comprehensive coverage of the issues, tools, and techniques needed to tackle cyber attacks. It consists of three parts (18 chapters) written by experts in the field.
The first part provides fundamentals. Its eight valuable chapters cover topics ranging from definitions, threats, investigating mechanisms, and tools, to forensics education. I was very much impressed by chapter 7 on analyzing digital evidence. It provides detailed guidelines on various threats, such as Internet protocol (IP) spoofing and intrusion. Particularly, this chapter presents how memory dump (RAM) is risky and how to carry out RAM analysis.
Part 2 has five chapters and a few case studies. Notable ones are cases of the Syrian electronic army, the Saudi Arabian government website, and Stuxnet. Chapter 11 describes how to use information and communications technology (ICT) as a protection tool against child exploitation; this looks unique. Chapter 12, “Cybercrime Classification and Characteristics,” provides a nice overview of various cyber crime categories. I would recommend reading this chapter first before reading any other chapters.
Part 3, also five chapters, covers how to tackle cyber attacks happening via the latest technologies. Chapters 14 and 15 clearly present how surveillance is important and critical in social media and in big data. Chapter 16 covers an important item on cyber liability insurance.
Overall, the editors have done a nice job of consolidating the critical elements of cyber crime and cyber terrorism. This book will be of great use to security practitioners and law enforcement professionals.
More reviews about this item: Amazon