| |
| |
Preface and Acknowledgement | |
| |
| |
Acknowledgement | |
| |
| |
Dedication | |
| |
| |
Foreword | |
| |
| |
| |
Cybercrime and Cybersecurity Issues: Stakes and Challenges for the 21st Century | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
The risks and the needs | |
| |
| |
| |
Supporting and developing the digital society | |
| |
| |
| |
Cybersecurity expectations | |
| |
| |
| |
Summary | |
| |
| |
| |
Exercises | |
| |
| |
| |
Cyberspace and Internet: a New Paradigm for Crime and Conflicts | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
The characteristics of cybercrimes | |
| |
| |
| |
The Internet: empowering criminals | |
| |
| |
| |
Summary in 10 tips | |
| |
| |
| |
Exercises | |
| |
| |
| |
Cybercrimes Against Persons | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
Affecting people's dignity and integrity | |
| |
| |
| |
Swindles and frauds over the Internet | |
| |
| |
| |
Identity crimes | |
| |
| |
| |
Privacy related offences | |
| |
| |
| |
Technological innovation and responsibility | |
| |
| |
| |
Summary | |
| |
| |
| |
Exercices | |
| |
| |
| |
Cybercrimes Against Assets | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
The typology of the main crimes against assets | |
| |
| |
| |
Frauds and scams | |
| |
| |
| |
Summary of offences from a technological perspective | |
| |
| |
| |
Case study from the FBI | |
| |
| |
| |
Exercises | |
| |
| |
| |
Cybercrimes Against States | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
Examples of cybercriminal activities that can affect states | |
| |
| |
| |
Cyberthreats against states | |
| |
| |
| |
Summary | |
| |
| |
| |
Exercises | |
| |
| |
| |
Cyberconflicts, Cyberwars and Cyberpower | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
From cybercrime to cyberwar | |
| |
| |
| |
Cyberwar | |
| |
| |
| |
Information war | |
| |
| |
| |
Cyberterrorism: a particular kind of cyberconflict | |
| |
| |
| |
Cybercrime or cyber conflict? | |
| |
| |
| |
Summary | |
| |
| |
| |
Exercises | |
| |
| |
| |
Understanding Cybercriminals | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
Towards a classification of cybercriminals | |
| |
| |
| |
About hacking and hackers | |
| |
| |
| |
Hackers' conventions, contests, and school | |
| |
| |
| |
Portraits of hackers | |
| |
| |
| |
Summary | |
| |
| |
| |
Exercices | |
| |
| |
| |
The Cybercriminal's Toolkits | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
Fundamental principles and constant factors of cyberattacks | |
| |
| |
| |
Spam and phishing: assets for criminals | |
| |
| |
| |
Means of obtaining connection parameters to access systems | |
| |
| |
| |
Some basic attacks | |
| |
| |
| |
The black market of cybercriminality | |
| |
| |
| |
Summary | |
| |
| |
| |
Exercises | |
| |
| |
| |
The Fight Against Cybercrime | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
Strengthening legislation is not enough | |
| |
| |
| |
An integrative approach and a global strategy | |
| |
| |
| |
The principal challenges in combating cybercrime at the international level | |
| |
| |
| |
Some privacy related considerations | |
| |
| |
| |
Summary | |
| |
| |
| |
Exercises | |
| |
| |
| |
The Global Cybercrime Ecosystem and Cybercriminal Investigation | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
The place of the struggle against cybercriminality in the cybercriminal ecosystem | |
| |
| |
| |
Cybercriminal investigation | |
| |
| |
| |
The idea of digital evidence | |
| |
| |
| |
Fundamental concepts in computer crime investigation | |
| |
| |
| |
Investigating computer crimes within organizations | |
| |
| |
| |
Summary | |
| |
| |
| |
Exercises | |
| |
| |
| |
A Global Approach to Cybersecurity | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
The evolution of information security | |
| |
| |
| |
Avoiding the cybersecurity gap | |
| |
| |
| |
A systemic approach to cybersecurity | |
| |
| |
| |
Summary | |
| |
| |
| |
Exercises | |
| |
| |
| |
Cybersecurity Governance and Security Measures | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
Managing the risks | |
| |
| |
| |
Defining a security policy | |
| |
| |
| |
Understanding ICT security from a technical point of view | |
| |
| |
| |
A functional approach to generic security tools | |
| |
| |
| |
Cyber security as a competitive advantage | |
| |
| |
| |
Summary | |
| |
| |
| |
Exercises | |
| |
| |
| |
Cyberconflict & Cybercrime: Prospects for a Global Response | |
| |
| |
| |
Understanding the context | |
| |
| |
| |
Some complex and global questions | |
| |
| |
| |
For an international treaty: a contribution to stability in cyberspace | |
| |
| |
| |
Connecting the world responsibly | |
| |
| |
| |
Summary | |
| |
| |
| |
Exercises | |
| |
| |
Glossary of main cybercrime and cybersecurity related terms | |
| |
| |
Annex: Some references | |
| |
| |
Index | |