NEW

Cybercrime: An Encyclopedia of Digital Crime, 1st Edition

  • Nancy E. Marion
  • Jason Twede
  • Published By:
  • ISBN-10: 1440857350
  • ISBN-13: 9781440857355
  • DDC: 364.16
  • 520 Pages | eBook
  • Original Copyright 2020 | Published/Released January 2021
  • This publication's content originally published in print form: 2020

  • Price:  Sign in for price

About

Overview

Cybercrime is characterized by criminal acts that take place in the borderless digital realm. It takes on many forms, and its perpetrators and victims are varied. From financial theft, destruction of systems, fraud, corporate espionage, and ransoming of information to the more personal, such as stalking and web-cam spying as well as cyberterrorism, this work covers the full spectrum of crimes committed via cyberspace. It covers the most noteworthy attacks while also focusing on the myriad issues that surround cybercrime. Topics include the different types of cyberattacks, cybercrime techniques, specific cybercriminals and cybercrime groups, and cybercrime investigations. While objective in its approach, this book does not shy away from covering such relevant, controversial topics as Julian Assange and Russian interference in the 2016 U.S. presidential election. It also provides detailed information on all of the latest developments in this constantly involving field.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
Contents.
List of Entries.
Introduction.
Chronology.
1: Abandonware.
2: Abene, Mark (1972–).
3: Advanced Persistent Threats.
4: Advanced Research Projects Agency Network.
5: Adware.
6: Anonymous.
7: Ashley Madison Breach.
8: Assange, Julian (1971–).
9: Auernheimer, Andrew Alan Escher (1985–).
10: Awareness.
11: Backdoor.
12: Banking Attacks.
13: Biometrics.
14: Bitcoin.
15: Black-Hat Hackers.
16: Blankenship, Loyd (1965–).
17: Bots and Botnets.
18: Bypass.
19: Calce, Michael (1986–).
20: Can-Spam Act of 2003.
21: Capital One Breach.
22: Carberp.
23: Center for Internet Security.
24: Chaney, Christopher (1977–).
25: Chaos Computer Club.
26: Child Pornography.
27: China.
28: Cleary, Ryan (1992–).
29: Code Red.
30: Comprehensive National Cybersecurity Initiative.
31: Computer Fraud and Abuse Act of 1986.
32: Continuous Diagnostics and Mitigation (CDM).
33: Copyright Infringement.
34: Corporate Account Takeover.
35: Costs of Cybercrime.
36: Council of Europe Cybercrime Convention.
37: Cracker and Cracking.
38: Craigslist Killers.
39: Credit Card Fraud.
40: Cryptocurrency.
41: Cryptography.
42: Cyberbullying.
43: Cybersecurity.
44: Cybersecurity Act of 2012.
45: Cybersecurity and Infrastructure Security Agency (CISA).
46: Cybersecurity Enhancement Act of 2014.
47: Cybersecurity Workforce Assessment Act of 2015.
48: Cybersquatting.
49: Cyberstalking.
50: Cyber-Surveillance Malware.
51: Cyberterrorism.
52: Cyberwarfare.
53: Dark Web.
54: Data Leakage.
55: Data Sovereignty.
56: Def Con.
57: Denial-of-Service Attack (Dos).
58: Department of Defense, Attacks on.
59: Digital Currency.
60: Digital Millennium Copyright Act.
61: Digital Rights Management.
62: Digital Signatures.
63: Distributed Denial-of-Service Attack (Ddos).
64: Domain Name System Cache Poisoning.
65: Doxing.
66: Draper, John (1943–).
67: Dread Pirate Roberts (Ulbricht, Ross; 1984–).
68: Dreamboard.
69: Drink or Die.
70: Drug Trafficking.
71: Dumpster Diving.
72: Economy, Effects on.
73: Einstein.
74: Electronic Frontier Foundation.
75: E-Mail Bomb.
76: E-Mail-Related Crimes.
77: Encryption.
78: End User License Agreement.
79: Engressia, Josef Carl, Jr. (1949–2007).
80: Entertainment, Effects On.
81: Equifax Breach.
82: Ethics.
83: European Cybercrime Center.
84: Exploit Kit.
85: Federal Bureau of Investigation.
86: Federal Information Security Management Act of 2002.
87: Financial Crimes.
88: Firewall.
89: Florida Computer Crime Act of 1978.
90: 414s.
91: Fraud.
92: Gambling.
93: Gameover Zeus Botnet.
94: Globalhell (gH).
95: Hacker and Hacking.
96: Hacktivism.
97: Hate Crime.
98: Health Care, Effects on.
99: Hijacking.
100: Identity Theft.
101: Iloveyou Virus.
102: Immigration and Customs Enforcement.
103: Insurance.
104: International Issues.
105: Interpol.
106: Keystroke Monitoring.
107: Legion of Doom.
108: Legislation.
109: Levin, Vladimir (1967–).
110: Lizard Squad.
111: Lloyd, Timothy (1967–).
112: Logic Bomb.
113: Lulzsec.
114: Malware.
115: Manning, Chelsea (1987–).
116: Masters of Deception.
117: Melissa Worm.
118: Mitnick, Kevin (1963–).
119: Money Laundering.
120: Morris, Robert Tappan (1965–).
121: Motives.
122: MPack.
123: Nakamoto, Satoshi.
124: National Cyber Investigative Joint Task Force.
125: National Cybersecurity Alliance.
126: National Cybersecurity and Critical Infrastructure Protection Act of 2013.
127: National Institute of Standards and Technology Cybersecurity Framework.
128: News Corp Hacking.
129: Nimda.
130: North Korea.
131: Open-Source.
132: Operation Apothecary.
133: Operation Aurora.
134: Operation Innocent Images.
135: Operation Marco Polo.
136: Operation Olympic Games.
137: Operation Phish Phry.
138: Operation Shrouded Horizon.
139: Password.
140: Payload.
141: Pen Register.
142: People'S Liberation Army Unit 61398.
143: Personal Data Notification and Protection Act of 2017.
144: Personally Identifying Information.
145: Pharming.
146: Phishing.
147: Phreaker.
148: Piggybacking.
149: Pile, Christopher (1969–).
150: Plankton.
151: Pokémon Go.
152: Political Uses.
153: Poulsen, Kevin (1965–).
154: President and Cybercrime.
155: Pretty Good Privacy.
156: Prevention.
157: Prism.
158: Privacy.
159: Profits from Cybercrime.
160: Public Domain.
161: Punishment.
162: Ransomware.
163: Reputation, Effects On.
164: Revenge Porn.
165: Rootkit.
166: Russia.
167: Russian Business Network.
168: Scavenging.
169: Secret Service.
170: Sexting.
171: Silk Road.
172: Simulation.
173: Skimmer.
174: Smart Card.
175: Sniffer.
176: Snowden, Edward.
177: Social Engineering.
178: Social Media.
179: Sony Pictures Entertainment Hack.
180: Spam.
181: Spoofing.
182: Spyware.
183: State Actor.
184: Storm Botnet.
185: Supervisory Control and Data Acquisition.
186: Superzapping.
187: Swartz, Aaron (1986–2013).
188: Swatting.
189: Symantec.
190: Syrian Electronic Army.
191: Teampoison.
192: Tools.