High-Technology Crime Investigator's Handbook

2nd Edition

Establishing and Managing a High-Technology Crime Prevention Program

Authors: Gerald Kovacich William C. Boni
Paperback ISBN: 9780750679299
eBook ISBN: 9780080468204
Imprint: Butterworth-Heinemann
Published Date: 25th August 2006
Page Count: 470
38.99 + applicable tax
59.95 + applicable tax
63.95 + applicable tax
48.95 + applicable tax
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.

Key Features

  • Provides an understanding of the global information environment and its threats
  • Explains how to establish a high-technology crime investigations unit and prevention program
  • Presents material in an engaging, easy-to-follow manner that will appeal to investigators, law enforcement professionals, corporate security and information systems security professionals; as well as corporate and government managers

Readership

PRIMARY MARKET: The targeted audience is INFOSEC and Information Assurance managers, technicians, and investigators; computer forensic professionals and forensic consulting firms; IT technical and IT network professionals interested in specializing in Security.

SECONDARY MARKET: Business managers, corporate security professionals managers, law enforcement officers, and students enrolled in IT computer and information security classes.

Table of Contents

  • Praise for the First Edition
  • First Edition Foreword
  • Second Edition Foreword
  • Preface
  • Acknowledgments
  • About the Authors
  • Part I: Introduction to the High-Technology Crime Environment

    • Introduction
    • Chapter 1: What Investigators Should Know About the High-Technology-Supported Global Environment and Its Threats

      • Publisher Summary
      • INTRODUCTION
      • THE GLOBALIZATION OF THE MARKETPLACE
      • HIGH TECHNOLOGY IS RAPIDLY CHANGING THE WORLD
      • THE THREE BASIC STEPS OF COMPUTER OPERATIONS
      • HIGH-TECHNOLOGY THREATS
      • CASE EXAMPLE: DON’T RUSH TO JUDGE
      • OTHER AREAS OF INTEREST
      • SUMMARY
    • Chapter 2: High-Technology Crime Miscreants: Profiles, Motives, and Philosophies

      • Publisher Summary
      • INTRODUCTION
      • A BRIEF HISTORY OF HIGH-TECHNOLOGY CRIME AND ITS ASSOCIATED MISCREANTS
      • REQUIREMENTS TO COMMIT A HIGH-TECHNOLOGY CRIME
      • AN EXAMPLE OF A CORPORATE EMPLOYEE AND THE “CRIME TRIAD”
      • INSIDER THREATS
      • OUTSIDER THREATS
      • WHO ARE THE HIGH-TECHNOLOGY MISCREANTS AND OTHERS ON THE INTERNET?
      • HACKERS, CRACKERS, AND PHREAKERS, OH MY!
      • PROFILE OF THE HIGH-TECHNOLOGY AND INTERNET FRAUDSTERS
      • HIGH-TECHNOLOGY TERRORISTS
      • WHY USE TERRORIST METHODS?
      • WHAT IS A TERRORIST ACT?
      • RESULTS OF TERRORIST ACTIONS
      • TERRORIST TECHNOLOGY THREAT ENVIRONMENT
      • HIGH-TECHNOLOGY ECONOMIC AND INDUSTRIAL ESPIONAGE ON THE INTERNET—NETSPIONAGE
      • INDUSTRIAL AND ECONOMIC ESPIONAGE DEFINED
      • TRY CATCHING THESE MISCREANTS!
      • PROPRIETARY ECONOMIC INFORMATION
      • ECONOMIC ESPIONAGE VULNERABILITIES
      • INFORMATION WARRIORS AND CYBER WARRIORS
      • SOPHISTICATED DRUG DEALER USE OF HIGH TECHNOLOGY
      • SUMMARY
    • Chapter 3: The Basic Techniques Used by High-Technology

Details

No. of pages:
470
Language:
English
Copyright:
© Butterworth-Heinemann 2006
Published:
Imprint:
Butterworth-Heinemann
eBook ISBN:
9780080468204
Paperback ISBN:
9780750679299

About the Author

Gerald Kovacich

Dr. Gerald L. Kovacich has more than 40 years of experience in industrial, business and government security, investigations, information systems security, and information warfare, both in the U.S. Government as a special agent, in international corporations, and subsequently as an international consultant and lecturer. He retired as the Information Warfare Technologist, Northrop Grumman Corporation to pursue a career as an international consultant, lecturer and writer.

Affiliations and Expertise

Security consultant, lecturer, and author, Oak Harbor, WA, USA

William C. Boni

Affiliations and Expertise

Director, Information Security for Motorola Corporation. He has worked as the Director of Information Protection Practices for Amgen; as a U.S. Army counterintelligence officer; federal agent and investigator; and a security consultant for such firms as PricewaterhouseCoopers and Ernst & Young

Reviews

"[The High-Technology-Crime Investigator’s Handbook, Second Edition] not only provides a basic introduction into the world of high-tech crime but, more importantly for the readers, it is the only book I have found whose primary purpose is not about investigating high-tech crimes, but how to establish and manage a high-tech crimes investigative unit." - Howard A. Schmidt, President & CEO, R & H Security Consulting LLC, Former White House Cyber Security Advisor