High-tech Crimes Revealed: Cyberwar Stories from the Digital FrontWith a target audience of computer security and other information technology professionals, Branigan (president, CyanLine LLC) focuses on the people more than the technology in his discussion of cybercrime and its investigation. He describes cases he's been involved with, some as a law enforcement officer, in order to give professionals an idea of how criminals exploit computer weaknesses and what can be done to catch them. After describing such episodes as an attack on a telephone network, an attack on an ISP, and a case of identity theft, he proceeds to a more general discussion of cybercrime, exploring such questions as why hackers hack and the proper conduct of criminal investigation. |
Contents
An Attack on the Telephone Network | 1 |
An Attack on an ISP | 35 |
If He Had Just Paid the Rent | 73 |
Copyright | |
13 other sections not shown
Common terms and phrases
able allow arrest backdoor bank bulletin board Celco cell phone cellular certainly Chapter collect computer systems computer virus connection cops copy corporate network credit card fraud credit card numbers criminal damage detect difficult disk drive downloaded easy electronic email message employees evidence example Figure Firefly firewall FreeBSD hacker attacks hacking hacking tools high technology high-tech crimes Hot-ice identity theft inside Internet Internet Service Provider investigation IP address issues law enforcement Linux log files look Mike modem monitor motivated network security operating system options password PayPal person personal computers police potential problem protect puter reported revenge rootkit search warrant sendmail server sniffer someone steal suspect system administrator target techniques Telephone Network telephone number things tion UNIX userid users usually victim virus viruses vulnerable vulnerable computers wanted Wesley Wily