Cybercrime and Information Technology
Theory and Practice: The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices
- Available for pre-order. Item will ship after August 16, 2021
Cybercrime and Information Technology: Theory and Practice: The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text.
While many books on the market cover investigations, forensic recovery, and presentation of evidence, and others explain computer and network security, this book explores both, explaining the essential principles governing computers, wireless and mobile devices, the Internet of Things, cloud systems, and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered, investigated, and adjudicated unless they are understood.
The legal portion of the book is an overview of the legal system in the United States, including cyberlaw standards, and regulations affecting cybercrime.
This section includes cases in progress that are shaping and developing legal precedents. As is often the case, new technologies require new statues and regulations—something the law is often slow to move on given the current speed in which technology advances.
- Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices.
- Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation.
- Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things.
- Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges.
Cybercrime and Information Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum, and is relevant to those studying Security Administration, Public Administrations, Police Studies, Business Administration, Computer Science, and Information Systems.
An Instructor’s Manual with Test Bank and PowerPoint slides is available to qualified professors for use in classroom instruction.
Table of Contents
- Understanding Computation
- Processing (Boolean Algebra, Logic Gates, Truth Tables)
- Beyond Conventional Computing
- A Brief History of Computing Devices
- Key words
- Cybercrime and the Cybercriminal
- The Origin and Definition of Cybercrime – It’s the Data, always the Data
- Brief Summary of the Phases and Evolution of Cybercrime
- Cybercrime Categories
- The future of Cybercrime
- Key words
- A brief overview of the Legal system in the United States
- The Courts system
- Types of Laws
- Administrative law
- Civil law
- Criminal law
- Key words
- Anti-Hacking Laws
- The Federal Computer Fraud and Abuse Act (CFAA)
- Computer Hacking Laws from individual states
- The Economic Espionage Act Of 1996 (EEA)
- The Digital Millennium Copyright Act (DMCA)
- Data Security Laws and Regulations in the Private Sector Entities
- The National Institute of Standards and Technology (NIST) Cybersecurity Framework
- The Health Insurance Portability and Accountability Act (HIPAA)
- Health Information Technology for Economic and Clinical Health Act (HITECH)
- Federal Trade Commission Act
- The Gramm-Leach-Bliley Act of 1999 (GLBA)
- Red Flags Rule
- The Federal Energy Regulatory Commission (FERC)
- Nuclear Regulatory Commission (NRC)
- Public & Private Sector Entities Partnerships in Cyberspace
- Cybersecurity Information Sharing Act of 2015 (CISA)
- The Cybersecurity and Infrastructure Security Agency (CISA)
- The National Cybersecurity and Critical Infrastructure Protection Act of 2014 (NCPA)
- Cybersecurity Enhancement Act of 2014 (CEA)
- Cybersecurity Requirements for Federal Government Contractors
- Federal Information Security Modernization Act of 2014
- NIST Information Security controls for Government Agencies and Contractors
- Most Important Internet Surveillance Laws in the U.S.
- All Writs Act
- Fourth Amendment
- Communication Assistant for Law enforcement Act of 1994 (CALEA)
- Key Privacy Laws in the U.S.
- Privacy Act of 1974
- The Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act)
- 18 U.S.C. § 1037. Fraud and Related Activity in Connection with Electronic Mail
- U.S.C. § 1029 Fraud and Related Activity in Connection with Access Devices
- 18 U.S. Code § 1028 Fraud and related activity in connection with identification documents, authentication features, and information
- Children’s Online Privacy Protection Act of 1998 (COPPA)
- Video Privacy Protection Act (VPPA) of 1988
- When U.S. began taking privacy seriously
- Key words
- Introduction to Computer Networking
- Essential Computer Network Components and Terminology
- Types of Networks
- Network Topology
- The Open Systems Interconnection (OSI) model
- The Internet protocol Suite (TPC/IP)
- How everything works together on the Internet: a Review
- Key words
- Understanding Security terminology
- Types of Cyber-attacks
- Prevention Mechanisms
- Identification, Authentication, and Authorization
- Modern Encryption
- Symmetric Encryption or Secret Key Cryptography (SKC)
- Asymmetric Encryption or Public Key Cryptography (PKC) or Asymmetric cryptography
- Digital Certificates and Certificate Authority (CA)
- Hash functions or Hashing algorithms
- Key words
- The Internet of Things – An Introduction
- A Summary of IoT Applications
- Automotive Sector
- Energy Sector
- Healthcare Sector
- Manufacturing Sector
- Retail Sector
- Smart Structures (Buildings, Roads and Bridges Sector)
- Smart Homes
- Transportation Sector
- IoT Components, Data Processing Architectures and Protocols
- Basic Components and Data Processing
- Big data in IoT
- Protocols and Standards
- Network Consideration for IoT Devises
- Key words
- A Brief History and Significant Milestones of Mobile Phones
- Components, Operating Systems (OS), Applications and Architecture
- Main Components
- Operating Systems (OS) and Applications (apps)
- Platform Architectures
- The Cellular Network
- What happens when a Mobile Phone is Turned ON?
- The Cell Tower or Cellular Base Station
- Mobile device tracking location: Cell Towers, GPS, and Indoor Localization
- Physical security
- Executable security
- Key words
Understanding Essential Computer Concepts.
Understanding Binary Data
Conversion from Binary to Decimal
Conversion from Decimal to Binary
Converting from Hexadecimal to Binary
Conversion from Binary to Hexadecimal
ASCII, EBCDIC & UNICODE
Processor Types (32-bit processors vs. 64-bit processors)
Compression (Lossy and Lossless Compression)
Quantum Computing is Poised to Change Everything
Cybercrime in a Data-Driven and Techno-Centric Society
The three Cybercrime Categories
The making of the Cybercriminal
Cybercrime and The Internet of Things (IoT)
Cybercrime: Machine Learning & Artificial Intelligence
Online Child Sexual Abuse and Exploitation (CSAE)
Cost of Cybercrime
The Role of Cryptocurrency in Cybercrime
State-Sponsored Cyberwarfare and Industrial Espionage
Understanding the US Legal System
Jurisdiction and Extradition
Most Cybercrimes are not reported
Statutory or Statute Law
Administrative laws (agency regulations) and Ordinance Law
Judicial decisions or Precedents or Case law
Laws, standards and regulations affecting Cybercrime
Current Legislative Framework in the U.S.
Key terms and major cases to understand CFAA
Limitations of the CFAA
Search and Seizure
Exceptions to the search warrant rule
Electronic Surveillance: private vs public
Exclusionary Rule and the Good Faith Exception
The USA Patriot Act and the Fourth Amendment
Electronic Communication Privacy Act (ECPA) of 1986
The Networking Environment
The World Wide Web and the Internet
Computer Security Technology and Principles
The CIA Triad model
Denial of service attacks
Structured Query Language (SQL) Injection or (SQLI)
Types of firewalls
Internet of Things (IoTs)
Range of Networks
Mobile Devices: The Smartphone
Appendix A complete text of the Computer Fraud and Abuse Act (CFAA) 18 U.S.C. § 1030
Appendix B 17 U.S.C. § 1201 Circumvention of copyright protection systems
Appendix B HIPAA §164.308 Administrative safeguards
Appendix C Constructs & Supporting Theories
Appendix D Sec. 13410 Improved Enforcement
Appendix E 15 U.S. Code § 45 - Unfair methods of competition unlawful; prevention by Commission. U.S.
Appendix F PART 681—Identity Theft Rules
Appendix G 6 U.S.C. §1501. Definitions
Appendix H 18 U.S.C. §1037 Fraud and related activity in connection with electronic mail
Appendix I Valuable IT and Management Certifications
Dr. Alex Alexandrou is an Assistant Professor at the Department of Security, Fire, and Emergency Management. He received his doctoral degree in computing studies from Pace University. Since 2005, he has been teaching computer and health informatics and telehealth courses at Pace University and the Fashion Institute of Technology (FIT). He has also produced and directed twelve episodes of a PBS talk show broadcasted on WNET, WNYC and CUNY-TV.
Dr. Alexandrou has worked extensively in both business and academic environments. He has over 18 years of professional experience in healthcare IT, including software integration, biometric and access control systems, deploying virtualization by transitioned use of physical servers into virtualization technology, realigning IT architecture with cloud-based networks and security platforms/technologies.
In addition, he has worked extensively with Agile/Scrum methodologies used for managing projects and software development and ensuring compliance with legal regulations such as the Health Insurance Portability and Accountability Act (HIPPA) and the Health Information Technology for Economic and Clinical Health (HITECK) Act.
Academically, he has conducted research studies on biometric authentication, electronic medical records, and mobile devices security and perception in the healthcare environment.
His current research interests include mobile forensics investigation, mobile devices vulnerabilities and threats, wireless networking and wireless vulnerabilities and exploits, security and privacy.