Table of contents : Contents......Page 12 Foreword......Page 26 Facing the Cybercrime Problem Head On......Page 34 Introduction......Page 35 Quantifying the Crisis......Page 36 Defining Cybercrime......Page 37 Categorizing Cybercrime......Page 51 Fighting Cybercrime......Page 68 Reviewing the History of Cybercrime......Page 82 Introduction......Page 83 The Evolution of a Word......Page 85 Hacking Ma Bell’s Phone Network......Page 86 Cybercrime Easy......Page 90 the Wild West of Networking......Page 91 Commercialization of the Internet......Page 94 Story Up to Date......Page 95 Understanding the People on the Scene......Page 126 Introduction......Page 127 Understanding Cybervictims......Page 162 Understanding Computer Basics......Page 180 Introduction......Page 181 The Language of the Machine......Page 197 Understanding the Binary Numbering System......Page 199 Operating Systems......Page 204 System Software......Page 205 Understanding Networking Basics......Page 234 Introduction......Page 235 Understanding Network Intrusions and Attacks......Page 312 Introduction......Page 313 Intrusions and Attacks......Page 315 Accidental “Attacks”......Page 320 Attack Activities......Page 325 Port Scans......Page 327 Address Spoofing......Page 330 Prevention and Response......Page 337 Understanding Password Cracking......Page 338 Brute Force......Page 339 Social Engineering......Page 346 Prevention and Response......Page 347 Understanding Technical Exploits......Page 348 Viruses, and Worms......Page 367 Trojans......Page 369 Worms......Page 371 The Script Kiddie Phenomenon......Page 373 Prevention and Response......Page 375 Understanding Cybercrime Prevention......Page 382 Introduction......Page 383 Importance of Physical Security......Page 390 Cryptographic Security......Page 397 Basic Cryptography Concepts......Page 406 and Software Security......Page 420 Implementing Software- Based Security......Page 424 Understanding Firewalls......Page 427 Forming an Incident Response Team......Page 431 Security Policies......Page 434 Implementing System Security......Page 464 Introduction......Page 465 The Security Mentality......Page 466 Deploying Antivirus Software......Page 474 Setting Access Permissions......Page 477 and E- Mail Security......Page 485 Clients More Secure......Page 489 Implementing Web Server Security......Page 498 DMZ vs. Stronghold......Page 499 Microsoft Operating Systems......Page 504 Securing Windows 9x Computers......Page 508 UNIX/ Linux Operating Systems......Page 516 Macintosh Operating Systems......Page 520 Understanding Mainframe Security......Page 522 Understanding Wireless Security......Page 523 Implementing Cybercrime Detection Techniques......Page 532 Introduction......Page 533 Security Auditing and Log Files......Page 535 Alarms, and Alerts......Page 543 Understanding E- Mail Headers......Page 549 Tracing a Domain Name or IP Address......Page 555 Commercial Intrusion Detection Systems......Page 557 Antidetection Tactics......Page 565 Other “Cyberstings”......Page 566 Collecting and Preserving Digital Evidence......Page 578 Introduction......Page 579 Evidence in a Criminal Case......Page 581 Collecting Digital Evidence......Page 585 The Role of Investigators......Page 587 “Snapshot” Tools and File Copying......Page 596 Defeating Data Recovery Techniques......Page 611 Evidence Logs......Page 614 Computer Forensics Resources......Page 616 Understanding Legal Issues......Page 620 Privacy Laws......Page 631 Building the Cybercrime Case......Page 640 Introduction......Page 641 Difficulty of Defining the Crime......Page 642 Effective Prosecution......Page 669 The Investigative Process......Page 670 Testifying in a Cybercrime Case......Page 683 Appendix - Fighting Cybercrime on a Global Scale......Page 692 Cybercrime Legislation......Page 693 Cybercrime Laws......Page 699