Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cyber crime and cyber terrorism investigator’s handbook
Akhgar B., Staniforth A., Bosco F., Syngress Publishing, Waltham, MA, 2014. 306 pp. Type: Book (978-0-128007-43-3)
Date Reviewed: Feb 6 2015

Cyber Crime and cyber terrorism have become the most critical and challenging issues not only within specific countries but across the world [1]. Both have reached a stage where wars can be won by cyber attacks, and not necessarily only on the battlefield [2]. Hence, both police who normally maintain law and order within the state and soldiers who protect the country should have expertise in handling cyber attacks. Development of a cyber army is the real need of the hour.

This edited volume on cyber crime and cyber terrorism provides comprehensive coverage of the issues, tools, and techniques needed to tackle cyber attacks. It consists of three parts (18 chapters) written by experts in the field.

The first part provides fundamentals. Its eight valuable chapters cover topics ranging from definitions, threats, investigating mechanisms, and tools, to forensics education. I was very much impressed by chapter 7 on analyzing digital evidence. It provides detailed guidelines on various threats, such as Internet protocol (IP) spoofing and intrusion. Particularly, this chapter presents how memory dump (RAM) is risky and how to carry out RAM analysis.

Part 2 has five chapters and a few case studies. Notable ones are cases of the Syrian electronic army, the Saudi Arabian government website, and Stuxnet. Chapter 11 describes how to use information and communications technology (ICT) as a protection tool against child exploitation; this looks unique. Chapter 12, “Cybercrime Classification and Characteristics,” provides a nice overview of various cyber crime categories. I would recommend reading this chapter first before reading any other chapters.

Part 3, also five chapters, covers how to tackle cyber attacks happening via the latest technologies. Chapters 14 and 15 clearly present how surveillance is important and critical in social media and in big data. Chapter 16 covers an important item on cyber liability insurance.

Overall, the editors have done a nice job of consolidating the critical elements of cyber crime and cyber terrorism. This book will be of great use to security practitioners and law enforcement professionals.

More reviews about this item: Amazon

Reviewer:  S. Ramakrishnan Review #: CR143158 (1505-0377)
1) Moore, R. Cybercrime: investigating high-technology computer crime (2nd ed.). Routledge, New York, NY, 2015.
2) Giacomello, G. Security in cyberspace: targeting nations, infrastructures, individuals. Bloomsbury Academic, New York, NY, 2014.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
World Wide Web (WWW) (H.3.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The dark side of employee email
Sipior J., Ward B. Communications of the ACM 42(7): 88-95, 1999. Type: Article
Aug 1 1999
The very brief history of digital evidence standards
Pollitt M. In Integrity and internal control in information systems V. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
Nov 20 2003
Teaching computer security at a small college
LeBlanc C., Stiller E.  Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004)407-411, 2004. Type: Proceedings
May 19 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy