ISBN:
9783642135477
Language:
English
Pages:
Online-Ressource (XIX, 414p. 7 illus, digital)
Series Statement:
SpringerLink
Series Statement:
Bücher
Parallel Title:
Buchausg. u.d.T. Cybercrimes
Keywords:
Mass media Law and legislation
;
Law
;
Law
;
Computers Law and legislation
;
Criminal Law
;
Comparative law
;
Mass media
;
Criminology
;
Internetkriminalität
;
Internet
;
Computerkriminalität
Abstract:
Designed to serve as a reference work for practitioners, academics, and scholars worldwide, this book is the first of its kind to explain complex cybercrimes from the perspectives of multiple disciplines (computer science, law, economics, psychology, etc.) and scientifically analyze their impact on individuals, society, and nations holistically and comprehensively. In particular, the book shows: how multiple disciplines concurrently bring out the complex, subtle, and elusive nature of cybercrimes; how cybercrimes will affect every human endeavor, at the level of individuals, societies, and nat
Description / Table of Contents:
Cybercrimes:A Multidisciplinary Analysis; Preface; Contents; List of Tables; List of Figures; Part I Introducing Cybercrimes; Chapter1 A Pragmatic, Experiential Definition of Computer Crimes; 1.1 Introducing Computer Crimes; 1.1.1 The Melissa Virus: The Turning Point; 1.1.1.1 The David Smith Prosecution; 1.1.1.2 Lessons from the David Smith Prosecution; 1.1.2 Cybercrimes in Early 2001; 1.1.3 Defining Technical Cybercrime; 1.2 The Battle to Control the Computing Process; 1.2.1 The Nature of the Battle; 1.2.2 The Cyberbattlefield; 1.2.2.1 The Key Elements of the Cyberbattlefield
Description / Table of Contents:
1.2.2.2 The Artificial and Highly Mutable Nature of the Cyberbattlefield1.2.2.3 Strategic Advantages and Disadvantages in the Cyberbattlefield; 1.2.2.4 Software Vulnerabilities; 1.3 Tools for Fighting the Battle to Control the Computing Process; 1.3.1 Defining Tools; 1.3.2 The Attacker's Technical Tools; 1.3.3 The Attacker's Social Tools; 1.3.4 The Defender's Tools; 1.4 The Convenience Overshoot Warning; References; Part II Computing and Networking Technology and Cybercrimes; Chapter2 Unauthorized Intrusions and Denial of Service; 2.1 Unauthorized Intrusions
Description / Table of Contents:
2.1.1 Tools to Exploit Unauthorized Intrusions2.1.1.1 Scanners; 2.1.1.2 Remote Exploits; 2.1.1.3 Local Exploits; 2.1.1.4 Monitoring Tools; 2.1.1.5 Stealth and Backdoor Tools; 2.1.1.6 Auto-Rooters; 2.1.2 Deployment of Toolkits for Unauthorized Intrusions; 2.1.2.1 A Methodology of Attack; 2.1.2.2 An Illustrative Example of a Targeted Attack; 2.2 Denial of Service; 2.2.1 Different Manifestations of DDoS Attacks; 2.2.2 Toolkits for DDoS; References; Chapter3 Malicious Code; 3.1 Introduction; 3.1.1 Trends that Facilitate Malicious Codeto Thrive; 3.2 The Nature of Malicious Code
Description / Table of Contents:
3.2.1 Operational Phases of Malicious Code3.3 Categories of Malicious Code; 3.3.1 Viruses; 3.3.2 Worms; 3.3.2.1 Categories of Worms; 3.3.3 Trojan Horse Programs; 3.3.4 Zombies; 3.3.5 Adware; 3.3.6 Malicious Mobile Code; 3.4 A Closer Look into the Inner Workings of Malicious Code; 3.4.1 Code Red; 3.4.2 Nimda; 3.4.3 Slammer; 3.5 Malicious Code Creation Process; 3.6 Techniques to Defeat Malicious Code; 3.6.1 Host-Based Protection; 3.6.1.1 Bulletproofing; 3.6.1.2 Scanning; 3.6.1.3 Behavioral Monitoring; 3.6.2 Network-Based Protection; 3.6.2.1 Network Intrusion Detection Systems
Description / Table of Contents:
3.6.2.2 Firewalls and Honey-Pots3.7 Vulnerability Management and Patching; 3.8 The Future of Malicious Code and New Mitigation Approaches; 3.8.1 The Future of Malicious Code; 3.8.2 The Future of Mitigation Approaches; References; Chapter4 Restricting Anti-Circumvention Devices; 4.1 Background: The Difference Between Digitaland Analog; 4.2 Law is Inadequate and Technology is Necessitated; 4.3 Content Protection Efforts; 4.3.1 Copy Prevention; 4.3.1.1 ``Uncopyable'' Computer Files; 4.3.1.2 Dongles; 4.3.2 Licenses and Legal Agreements; 4.3.3 Data Format as Barriers
Description / Table of Contents:
4.3.4 Software-Based Copy-Protection Systems
Note:
Includes bibliographical references and index
DOI:
10.1007/978-3-642-13547-7
URL:
Volltext
(lizenzpflichtig)
Permalink