Cybercrime and Information Technology : The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices book cover
1st Edition

Cybercrime and Information Technology
The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices

ISBN 9781032053851
Published October 28, 2021 by CRC Press
454 Pages 196 B/W Illustrations

SAVE $14.99
was $74.95
USD $59.96

Prices & shipping based on shipping country


Book Description

Cybercrime and Information Technology: Theory and Practice—The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.

While many books on the market cover investigations, forensic recovery, and presentation of evidence, and others explain computer and network security, this book explores both, explaining the essential principles governing computers, wireless and mobile devices, the Internet of Things, cloud systems, and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered, investigated, and adjudicated unless they are understood.

The legal portion of the book is an overview of the legal system in the United States, including cyberlaw standards, and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case, new technologies require new statues and regulations—something the law is often slow to move on given the current speed in which technology advances.

Key Features:

  • Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices.
  • Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation.
  • Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things.
  • Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges.

Cybercrime and Information Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum, and is relevant to those studying Security Administration, Public Administrations, Police Studies, Business Administration, Computer Science, and Information Systems.

An Instructor’s Manual with Test Bank and chapter PowerPoint slides is available to qualified professors for use in classroom instruction.

Table of Contents



    Author’s Bio

    Chapter 1

    Understanding Essential Computer Concepts.

      1. Understanding Computation
      2. Input
      3. Understanding Binary Data

        Conversion from Binary to Decimal

        Conversion from Decimal to Binary


        Converting from Hexadecimal to Binary

        Conversion from Binary to Hexadecimal


      4. Processing (Boolean Algebra, Logic Gates, Truth Tables)
      5. Processor Types (32-bit processors vs. 64-bit processors)

      6. Storage
      7. Compression (Lossy and Lossless Compression)

      8. Output
      9. Pixels

        Color depth

        Color models

        Screen resolution

      10. Beyond Conventional Computing
      11. Quantum Computing is Poised to Change Everything

      12. A Brief History of Computing Devices
      13. Conclusion
      14. Key words

    Chapter 2

    Cybercrime in a Data-Driven and Techno-Centric Society

      1. Cybercrime and the Cybercriminal
      2. The Origin and Definition of Cybercrime – It’s the Data, always the Data
      3. Brief Summary of the Phases and Evolution of Cybercrime
      4. Phase I

        Phase II

        Phase III

        Phase IV

      5. Cybercrime Categories
      6. The three Cybercrime Categories

      7. The future of Cybercrime
      8. The making of the Cybercriminal

        Cybercrime and The Internet of Things (IoT)

        Cybercrime: Machine Learning & Artificial Intelligence

        Online Child Sexual Abuse and Exploitation (CSAE)

        Cost of Cybercrime

        The Role of Cryptocurrency in Cybercrime

        State-Sponsored Cyberwarfare and Industrial Espionage

      9. Conclusion
      10. Key words

    Chapter 3

    Understanding the US Legal System

      1. Introduction
      2. Jurisdiction and Extradition

        Online anonymity

        Digital evidence

        Most Cybercrimes are not reported

      3. A brief overview of the Legal system in the United States
      4. The Constitution

        Statutory or Statute Law

        Administrative laws (agency regulations) and Ordinance Law

        Judicial decisions or Precedents or Case law

        1. The Courts system

      5. Types of Laws
        1. Administrative law
        2. Civil law
        3. Criminal law

      6. Conclusion
      7. Key words

      Chapter 4

      Laws, standards and regulations affecting Cybercrime

      1. Introduction
      2. Current Legislative Framework in the U.S.

      3. Anti-Hacking Laws
        1. The Federal Computer Fraud and Abuse Act (CFAA)
        2. Key terms and major cases to understand CFAA

          Limitations of the CFAA

        3. Computer Hacking Laws from individual states
        4. The Economic Espionage Act Of 1996 (EEA)
        5. The Digital Millennium Copyright Act (DMCA)

      4. Data Security Laws and Regulations in the Private Sector Entities
        1. The National Institute of Standards and Technology (NIST) Cybersecurity Framework
        2. The Health Insurance Portability and Accountability Act (HIPAA)
        3. Health Information Technology for Economic and Clinical Health Act (HITECH)
        4. Federal Trade Commission Act
        5. The Gramm-Leach-Bliley Act of 1999 (GLBA)
        6. Red Flags Rule
        7. The Federal Energy Regulatory Commission (FERC)
        8. Nuclear Regulatory Commission (NRC)

      5. Public & Private Sector Entities Partnerships in Cyberspace
        1. Cybersecurity Information Sharing Act of 2015 (CISA)
        2. The Cybersecurity and Infrastructure Security Agency (CISA)
        3. The National Cybersecurity and Critical Infrastructure Protection Act of 2014 (NCPA)
        4. Cybersecurity Enhancement Act of 2014 (CEA)

      6. Cybersecurity Requirements for Federal Government Contractors
        1. Federal Information Security Modernization Act of 2014
        2. NIST Information Security controls for Government Agencies and Contractors

      7. Most Important Internet Surveillance Laws in the U.S.
        1. All Writs Act
        2. Fourth Amendment
        3. Search and Seizure

          Exceptions to the search warrant rule

          Electronic Surveillance: private vs public

          Exclusionary Rule and the Good Faith Exception

          The USA Patriot Act and the Fourth Amendment

          Electronic Communication Privacy Act (ECPA) of 1986

        4. Communication Assistant for Law enforcement Act of 1994 (CALEA)

      8. Key Privacy Laws in the U.S.
        1. Privacy Act of 1974
        2. The Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act)
        3. 18 U.S.C. § 1037. Fraud and Related Activity in Connection with Electronic Mail
        4. U.S.C. § 1029 Fraud and Related Activity in Connection with Access Devices
        5. 18 U.S. Code § 1028 Fraud and related activity in connection with identification documents, authentication features, and information
        6. Children’s Online Privacy Protection Act of 1998 (COPPA)
        7. Video Privacy Protection Act (VPPA) of 1988
        8. When U.S. began taking privacy seriously

      9. Conclusion
      10. Key words

      Chapter 5

      The Networking Environment

      1. Introduction to Computer Networking
      2. Protocols

        The World Wide Web and the Internet

        1. Essential Computer Network Components and Terminology

      3. Types of Networks
      4. Network Topology
      5. The Open Systems Interconnection (OSI) model
      6. The Internet protocol Suite (TPC/IP)
      7. TCP


      8. How everything works together on the Internet: a Review
      9. Conclusion
      10. Key words

      Chapter 6

      Computer Security Technology and Principles

      1. Introduction
      2. The CIA Triad model

      3. Understanding Security terminology
      4. Types of Cyber-attacks
      5. Adware

        Denial of service attacks



        Structured Query Language (SQL) Injection or (SQLI)

        Wi-Fi Hacking

      6. Prevention Mechanisms
      7. Types of firewalls

      8. Identification, Authentication, and Authorization
      9. Modern Encryption
        1. Symmetric Encryption or Secret Key Cryptography (SKC)
        2. Asymmetric Encryption or Public Key Cryptography (PKC) or Asymmetric cryptography
        3. Digital Certificates and Certificate Authority (CA)
        4. Hash functions or Hashing algorithms

      10. Conclusion
      11. Key words

      Chapter 7

      Internet of Things (IoTs)

      1. The Internet of Things – An Introduction
      2. A Summary of IoT Applications
        1. Automotive Sector
        2. Energy Sector
        3. Healthcare Sector
        4. Manufacturing Sector
        5. Retail Sector
        6. Smart Structures (Buildings, Roads and Bridges Sector)
        7. Smart Homes
        8. Transportation Sector

      3. IoT Components, Data Processing Architectures and Protocols
        1. Basic Components and Data Processing
        2. Big data in IoT
        3. Architectures
        4. Protocols and Standards

      4. Network Consideration for IoT Devises
      5. Bandwidth


        Power usage

        Range of Networks

      6. Security
      7. Conclusion
      8. Key words

      Chapter 8

      Mobile Devices: The Smartphone

      1. Introduction
      2. A Brief History and Significant Milestones of Mobile Phones
      3. Components, Operating Systems (OS), Applications and Architecture
        1. Main Components
        2. Operating Systems (OS) and Applications (apps)
        3. Platform Architectures

      4. The Cellular Network
        1. What happens when a Mobile Phone is Turned ON?
        2. The Cell Tower or Cellular Base Station
        3. Mobile device tracking location: Cell Towers, GPS, and Indoor Localization

      5. Security
        1. Physical security
        2. Executable security

      6. Conclusion
      7. Key words


    Appendix A complete text of the Computer Fraud and Abuse Act (CFAA) 18 U.S.C. § 1030

    Appendix B 17 U.S.C. § 1201 Circumvention of copyright protection systems

    Appendix B HIPAA §164.308 Administrative safeguards

    Appendix C Constructs & Supporting Theories

    Appendix D Sec. 13410 Improved Enforcement

    Appendix E 15 U.S. Code § 45 - Unfair methods of competition unlawful; prevention by Commission. U.S.

    Appendix F PART 681—Identity Theft Rules

    Appendix G 6 U.S.C. §1501. Definitions

    Appendix H 18 U.S.C. §1037 Fraud and related activity in connection with electronic mail

    Appendix I Valuable IT and Management Certifications


View More



Dr. Alex Alexandrou is an Assistant Professor at the Department of Security, Fire, and Emergency Management. He received his doctoral degree in computing studies from Pace University. Since 2005, he has been teaching computer and health informatics and telehealth courses at Pace University and the Fashion Institute of Technology (FIT). He has also produced and directed twelve episodes of a PBS talk show broadcasted on WNET, WNYC and CUNY-TV.

Dr. Alexandrou has worked extensively in both business and academic environments. He has over 18 years of professional experience in healthcare IT, including software integration, biometric and access control systems, deploying virtualization by transitioned use of physical servers into virtualization technology, realigning IT architecture with cloud-based networks and security platforms/technologies. 

In addition, he has worked extensively with Agile/Scrum methodologies used for managing projects and software development and ensuring compliance with legal regulations such as the Health Insurance Portability and Accountability Act (HIPPA) and the Health Information Technology for Economic and Clinical Health (HITECK) Act.

Academically, he has conducted research studies on biometric authentication, electronic medical records, and mobile devices security and perception in the healthcare environment. 

His current research interests include mobile forensics investigation, mobile devices vulnerabilities and threats, wireless networking and wireless vulnerabilities and exploits, security and privacy.