Handbook of Electronic Security and Digital Forensics

Front Cover
World Scientific, 2010 - Business & Economics - 708 pages
The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals.

This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

1 OS and Network Security Roberto Di Pietro and Nino Vincenzo Verde
1
2 Authentication Roberto Di Pietro and Nino Vincenzo Verde
25
3 Classification of Attacks on Cryptographic Protocols Luca Spalazzi and Simone Tacconi
47
4 WiFiSecurity Sufian Yousef
83
5 Auditing Penetration Testing and Ethical Hacking Frank Leonhardt
93
6 VoIP Security Issues Frank Leonhardt
103
Considering Security from the Early Stages of the Information Systems Development Haralambos Mouratidis
115
8 Online Transactions Security James Kadirire
133
19 A Methodology for Smartphones Internal Memory Acquisition Decoding and Analysis Rosamaria Berte Fabio Dellutri Antonio Grillo Alessandro ...
383
20 Analysis of EMail Headers Alessandro Obino and Massimo Bernaschi
395
21 Digital Evidence Manipulation Using AntiForensic Tools and Techniques Hamid Jahankhani and Elidon Beqiri
411
22 Hidden Data and Steganography David Lilburn Watson
427
23 Cyberspace and Cybercrime Vagelis Papakonstantinou
455
The Security Perspective Vagelis Papakonstantinou
477
25 Legal Issues on the Protection of Personal Data on the Internet Evi Chatziliassi
497
Legal Facts Hamid Jahankhani and Chris O Folorunso
513

9 Security and EAccessibility of Online Banking Hamid Jahankhani Liaqat Ali and Hossein Jahankhani
155
10 Towards an Integrated Network Security Framework Using the YComm Architecture Glenford Mapp Jon Crowcroft and Raphael Phan
169
11 Introduction to Behavioural Biometrics Kenneth Revett
185
12 Information Security Management and Standards of Best Practice Theo Tryfonas
207
13 Security Risk Management Strategy Hamid Jahankhani Mathews Z Nkhoma and Haralambos Mouratidis
237
14 Open Source Intelligence David Lilburn Watson
263
15 Digital Identity Management Elias Pimenidis
279
16 ESecurity and Critical National Infrastructures Howard Thompson
295
17 Digital Forensics Techniques and Tools Roberto Di Pietro and Nino Vincenzo Verde
321
18 iPod Cell and Smart Phone Forensics M Mattiucci R Olivieri L Giampieri S Monfreda and G Finizia
357
27 The Use of Electronic Surveillance in Conducting Criminal Investigations on the Internet Murdoch Watney
525
28 The Legal Conflict Between Security and Privacy in Addressing Terrorism and Other Crime on the Internet Murdoch Watney
553
29 Cybercrime Hamid Jahankhani and Ameer AlNemrat
573
Innocent Victims and Their Plight for Justice Hamid Jahankhani and Kevin Orme
585
31 Intelligent Decision Support Systems for Assistance in Forensic Investigation Processes Dale Dzemydiene
603
32 Bioinformatics and Biometrics Kenneth Revett
631
33 Criminal Data Mining Viktoras Justickis
657
Index
693
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information