About the Book :
This book, focusing on cyberthreats and cybersecurity, provides the much needed awareness in the times of growing cybercrime episodes.Comprehensive treatment of important topic - cybersecurity to help readers understand the implications of cybercrime.The book provides adequate orientation on laws in reference to cybercrime and cybersecurity taking into account the Indian as well as global scenario.Awareness created through simple practical tips and tricks, educates readers to learn how to avoid becoming victims of cybercrime.Written by InfoSec domain SME and co-authored by qualified ethical hacking professional who is also a security certified.Well-presented case illustrations and examples from real life to underline the significance of topics addressed in each chapter.
About the Author :
Nina Godbole is an author of the book Information Systems Security: Security Management, Metrics, Frameworks and Best Practices published by Wiley India in January 2009. She is also on the Editorial Board of IEEE Computer Society. She has published numerous articles on topics in leading IT magazines. She has a vast work experience in the IT industry in Software Quality Assurance, systems analysis and design, application support services as well as application audit and IS audit. Nina is a CIPP/IT - a privacy professional certified by the IAPP USA (International Association of Privacy Professional) as well as a CISA (Certified Information Systems Auditor) certified by ISACA USA (Information Systems Audit and Control Association). Nina is also an ITIL foundation certified professional, a PMP, CQA and CSTE from QAI, USA (Quality Assurance Institute).Sunit Belapure has more than 8 years experience in Information Security domain out of his total industry experience of more than 18 years. He works in the domain of ISRM (Information Security and Risk and Management) and Information System Audit. Sunit has respective international certifications to his credit - CISA (Certified Information Systems Auditor) from ISACA-USA, IRCA certified ISO 27001:2005 Lead Auditor, Certified Ethical Hacker (CEH v5.0) from EC-Council-USA and CISM (Certified Information Security Manager) from ISACA-USA. He is a member of ISACA, USA. He engages into Compliance and Assurance assignments (for ERP as well as for Non-ERP applications) under IS security and IT Governance domain. Sunit is a noted speaker on Information Security domain at reputed institutes in and around Pune.
Interesting Facts :
Foreword by Dr Kamlesh Bajaj, CEO, Data Security Council of India.Authors are industry professionals with extensive experience in the domain of Information Security and Data Privacy.A real handy reference that all must have in todays world of cyberthreat.Aimed at individuals, students (including those doing law courses), IT professionals and legal professionals for building awareness about cybercrime and cybersecurity.Useful for candidates aspiring to appear for international certification exams in the domain of Information Security/IT Security and other related domains.All dimensions of cybersecurity discussed - including cyberforensics.Complete with an overview of global laws that matter for cybersecurity.Companion CD contains useful appendices with rich contents that serve as supplementary material to the chapters.Understanding of key concepts facilitated through well-illustrated diagrams, tables and vignettes inside the chapters.Real-life case illustrations and examples provided to help consolidate understanding of topics presented in each chapter.Review questions and reference material pointers after each chapter.Companion CD contains: 3 Chapterster 10 - Cybercrime and Cyberterrorism: Social Political, Ethical and Psychological Dimensionster 11 - Cybercrime: Illustrations, Examples and Mini-Casester 12 - Careers in Cybersecurity23 appendices with guidelines, checklists and handy reference to relevant Indian Acts
Introduction to CybercrimeIntroductionCybercrime: Definition and Origins of the Word Cybercrime and Information Security Who are Cybercriminals?Classifications of CybercrimesCybercrime: The Legal PerspectivesCybercrimes: An Indian PerspectiveCybercrime and the Indian ITA 2000A Global Perspective on CybercrimesCybercrime Era: Survival Mantra for the NetizensConcluding Remarks and Way Forward to Further ChaptersCyberoffenses: How Criminals Plan ThemIntroductionHow Criminals Plan the AttacksSocial EngineeringCyberstalkingCybercafe and CybercrimesBotnets: The Fuel for CybercrimeAttack VectorCloud ComputingCybercrime: Mobile and Wireless DevicesIntroductionProliferation of Mobile and Wireless DevicesTrends in Mobility Credit Card Frauds in Mobile and Wireless Computing EraSecurity Challenges Posed by Mobile DevicesRegistry Settings for Mobile DevicesAuthentication Service SecurityAttacks on Mobile/Cell PhonesMobile Devices: Security Implications for OrganizationsOrganizational Measures for Handling Mobile Organizational Security Policies and Measures in Mobile Computing EraLaptopsTools and Methods Used in CybercrimeIntroductionProxy Servers and AnonymizersPhishingPassword CrackingKeyloggers and SpywaresVirus and WormsTrojan Horses and BackdoorsSteganographyDoS and DDoS AttacksSQL InjectionBuffer OverflowAttacks on Wireless NetworksPhishing and Identity TheftIntroductionPhishingIdentity Theft (ID Theft)Cybercrimes and Cybersecurity: The Legal PerspectivesIntroductionCybercrime and the Legal Landscape around the WorldWhy Do We Need Cyberlaws: The Indian ContextThe Indian IT ActChallenges to Indian Law and Cybercrime Scenario in IndiaConsequences of Not Addressing the Weakness in Information Technology ActDigital Signatures and the Indian IT ActAmendments to the Indian IT ActCybercrime and PunishmentCyberlaw, Technology and Students: Indian ScenarioUnderstanding Computer ForensicsIntroductionHistorical Background of CyberforensicsDigital Forensics ScienceThe Need for Computer ForensicsCyberforensics and Digital EvidenceForensics Analysis of E-MailDigital Forensics Life CycleChain of Custody ConceptNetwork ForensicsApproaching a Computer Forensics InvestigationSetting up a Computer Forensics Laboratory: Understanding the RequirementsComputer Forensics and SteganographyRelevance of the OSI 7 Layer Model to Computer ForensicsForensics and Social Networking Sites: The Security/Privacy ThreatsComputer Forensics from Compliance PerspectiveChallenges in Computer ForensicsSpecial Tools and TechniquesForensics AuditingAntiforensicsForensics of Hand-Held DevicesIntroduction Understanding Cell Phone Working CharacteristicsHand-Held Devices and Digital ForensicsToolkits for Hand-Held Device ForensicsForensics of iPods and Digital Music DevicesAn Illustration on Real Life Use of ForensicsTechno-Legal Challenges with Evidence from Hand-Held DevicesOrganizational Guidelines on Cell Phone ForensicsCybersecurity: Organizational ImplicationsIntroductionCost of Cybercrimes and IPR Issues: Lessons for Organizations Web Threats for Organizations: The Evils and PerilsSecurity and Privacy Implications from Cloud ComputingSocial Media Marketing: Security Risks and Perils for OrganizationsSocial Computing and the Associated Challenges for OrganizationsProtecting People's Privacy in the OrganizationOrganizational Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage PolicyIncident Handling: An Essential Component of CybersecurityForensics Best Practices for OrganizationsMedia and Asset Protection: Best Practices for OrganizationsImportance of Endpoint Security in OrganizationsCybercrime and Cyberterrorism: Social, Political, Ethical and Psychological DimensionsIntroductionIntellectual Property in the CyberspaceThe Ethical Dimension of CybercrimesThe Psychology, Mindset and Skills of Hackers and Other CybercriminalsSociology of CybercriminalsInformation Warfare: Perception or An Eminent Reality?Cybercrime: Illustrations, Examples and Mini-CasesIntroduction Real-Life ExamplesMini-CasesIllustrations of Financial Frauds in Cyber DomainDigital Signature-Related Crime ScenariosDigital Forensics Case IllustrationsOnline ScamsCareers in CybersecurityIntroductionIT Security OrganizationCareer Paths in CybersecurityCybersecurity CertificationsGuide Path Index
|Title:||Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal Perspectives||Publisher:||Wiley India Pvt Ltd|
|Author:||Sunit Belapure Nina Godbole|
|No. of Pages:||636|
* The book summary and image may be of a different edition or binding of the same title.
* Book reviews are added by registered customers. They need not necessarily buy book.
* These books are NOT available for reading online or for free download in PDF or ebook format.
* Price can change due to reprinting, price change by publisher or sourcing cost change for imported books.
www.infibeam.com/Books is the biggest online bookstore in India for sale of books at best price - fiction, literature, audiobooks, study guides, novels, story books, rare books, textbooks and books by popular authors. These are available in various editions and bindings e.g. paperback and at best discount.
Safe & Secure Shopping