Computer Crime

A Crimefighter's Handbook

David J. Icove, Karl A. Seger, William R. VonStorch

Publisher: O'Reilly, 1995, 437 pages

ISBN: 1-56592-086-4

Keywords: IT Security

Last modified: April 20, 2021, 2:08 p.m.

Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet... Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up with their methods.

This book is for anyone who needs to know what today's computer crimes look like, how to prevent them, and how to detect, investigate, and prosecute them if they do occur. It contains basic computer security information as well as guidelines for investigators, law enforcement, and computer system managers and administrators. Also included is the text of U.S. federal, state, and international computer crime laws.

  • Part I: Overview
    1. Introduction to Computer Crime
      • Types of Attacks
      • What Laws Prohibit Computer Crime?
      • Where Are the Vulnerabilities?
      • Who Commits Computer Crimes?
      • How Can Computer Crime Be Prevented?
      • Handling Computer Crime
    2. What Are the Crimes?
      • Breaches of Physical Security
      • Breaches of Personnel Security
      • Breaches of Communication and Data Security
      • Breaches of Operations Security
      • Ways of Detecting Common Attacks
    3. Who Commits Computer Crimes?
      • Types of Offenders
      • Characteristics of Computer Criminals
      • Computer Crime Adversarial Matrix
    4. What Are the Laws?
      • Who Has Jurisdiction?
      • U.S. Federal Laws
      • State Laws
      • International Laws
  • Part II: Preventing Computer Crime
    1. What Is at Risk?
      • Threats, Vulnerabilities, and Countermeasures
      • Steps in Risk Analysis
      • Identifying Threats
      • Identifying Assets
      • Identifying Vulnerabilities and Countermeasures
    2. Physical Security
      • Basic Physical Security
      • Testing Physical Security Programs
      • Natural Disaster Checklists
      • Environmental Disaster Checlists
      • Intruder Checklists
    3. Personnel Security
      • Developing a Personnel Security Program
      • Types of Threats
      • Different People/Different Threats
      • Personnel Security Checklist
    4. Communications Security
      • Types of Networks
      • Network Communications
      • Protecting Your Network Communications
      • Communications Security Checklist
    5. Operations Security
      • Planning Operations Security
      • Where Do Computer Criminals Get Information?
      • Developing an Operations Security Program
      • Ongoing Operations Security
  • Part III: Handling Computer Crime
    1. Planning How to Handle a Computer Crime
      • Finding Out About a Computer Crime
      • Setting Up Detection Measures
      • Forming a Crisis Management Team
      • What to Do If the Intruder Is on the System
      • Examining Log Files and Other Evidence
      • Be Careful from the Start
    2. Investigating a Computer Crime
      • Calling in Law Enforcement
      • Forming an Investigative Team
      • How to Investigate
      • Preparing a Search Warrant
      • What to bring to the Scene
      • Executing a Search Warrant
      • Getting Help from a technical Adviser
      • Auditing Tools
      • Guidelines for Handling Evidence
    3. Prosecuting a Computer Crime
      • Judges and Juries
      • Evidence in Computer Crime Cases
      • Testifying in Computer Crime Cases
      • After the Prosecution
  • Part IV: Computer Crime Laws
  • Part V: Appendices
    1. Resource Summary
      • Books
      • Periodicals
      • User Organizations
      • Emergency Response Organizations
      • Government Agencies
      • Electronic Resources
    2. Raiding the Computer Room
      • Warrant Requirement
      • Executing the Search Warrant
      • Conclusion
    3. The Microcomputer as Evidence
      • Introduction
      • Procedures for Submission and Examination of Computer Evidence
      • Conclusion
      • References
    4. A Sample Search Warrant

Reviews

Computer Crime

Reviewed by Roland Buresund

Mediocre **** (4 out of 10)

Last modified: May 21, 2007, 2:57 a.m.

Starts OK, but gets bogged down in US legal codes. Some unique value probably exists.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required