ebook img

New threats and countermeasures in digital crime and cyber terrorism PDF

390 Pages·2015·12.055 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview New threats and countermeasures in digital crime and cyber terrorism

New Threats and Countermeasures in Digital Crime and Cyber Terrorism Maurice Dawson University of Missouri–St. Louis, USA Marwan Omar Nawroz University, Iraq A volume in the Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series Managing Director: Lindsay Johnston Managing Editor: Austin DeMarco Director of Intellectual Property & Contracts: Jan Travers Acquisitions Editor: Kayla Wolfe Production Editor: Christina Henning Development Editor: Brandon Carbaugh Cover Design: Jason Mull Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA, USA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2015 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data New threats and countermeasures in digital crime and cyber terrorism / Maurice Dawson and Marwan Omar, editors. pages cm Includes bibliographical references and index. ISBN 978-1-4666-8345-7 (hardcover) -- ISBN 978-1-4666-8346-4 (ebook) 1. Computer crimes--Prevention. 2. Cyberter- rorism--Prevention. 3. Computer security. I. Dawson, Maurice, 1982- II. Omar, Marwan, 1982- HV6773.N4745 2015 005.8--dc23 2015006753 This book is published in the IGI Global book series Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCF- CT) (ISSN: 2327-0381; eISSN: 2327-0373) British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. For electronic access to this publication, please contact: [email protected]. Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series ISSN: 2327-0381 EISSN: 2327-0373 Mission The digital revolution has allowed for greater global connectivity and has improved the way we share and present information. With this new ease of communication and access also come many new chal- lenges and threats as cyber crime and digital perpetrators are constantly developing new ways to attack systems and gain access to private information. The Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series seeks to publish the latest research in diverse fields pertaining to crime, warfare, terrorism and forensics in the digital sphere. By advancing research available in these fields, the ADCFCT aims to present research- ers, academicians, and students with the most current available knowledge and assist security and law enforcement professionals with a better understanding of the current tools, applications, and methodolo- gies being implemented and discussed in the field. Coverage • Digital Surveillance • Encryption IGI Global is currently accepting manuscripts • Data Protection for publication within this series. To submit a pro- • Information warfare posal for a volume in this series, please contact our • Cyber warfare Acquisition Editors at [email protected] • Telecommunications Fraud or visit: http://www.igi-global.com/publish/. • Identity Theft • Database Forensics • Global Threat Intelligence • Malware The Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series (ISSN 2327-0381) is published by IGI Global, 701 E. Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com. This series is composed of titles available for purchase indi- vidually; each title is edited to be contextually exclusive from any other title within the series. For pricing and ordering information please visit http://www.igi-global.com/book-series/advances-digital-crime-forensics-cyber/73676. Postmaster: Send all address changes to above address. Copyright © 2015 IGI Global. All rights, including translation in other languages reserved by the publisher. No part of this series may be reproduced or used in any form or by any means – graphics, electronic, or mechanical, including photocopying, recording, taping, or informa- tion and retrieval systems – without written permission from the publisher, except for non commercial, educational use, including classroom teaching purposes. The views expressed in this series are those of the authors, but not necessarily of IGI Global. Titles in this Series For a list of additional titles in this series, please visit: www.igi-global.com Cybersecurity Policies and Strategies for Cyberwarfare Prevention Jean-Loup Richet (University of Nantes, France) Information Science Reference • copyright 2015 • 393pp • H/C (ISBN: 9781466684560) • US $245.00 (our price) Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance Maria Manuela Cruz-Cunha (Polytechnic Institute of Cavado and Ave, Portugal) and Irene Maria Portela (Poly- technic Institute of Cávado and Ave, Portugal) Information Science Reference • copyright 2015 • 602pp • H/C (ISBN: 9781466663244) • US $385.00 (our price) The Psychology of Cyber Crime Concepts and Principles Gráinne Kirwan (Dun Laoghaire Institute of Art, Design and Technology, Ireland) and Andrew Power (Dun Laoghaire Institute of Art, Design and Technology, Ireland) Information Science Reference • copyright 2012 • 372pp • H/C (ISBN: 9781613503508) • US $195.00 (our price) Cyber Crime and the Victimization of Women Laws, Rights and Regulations Debarati Halder (Centre for Cyber Victim Counselling (CCVC), India) and K. Jaishankar (Manonmaniam Sun- daranar University, India) Information Science Reference • copyright 2012 • 264pp • H/C (ISBN: 9781609608309) • US $195.00 (our price) Digital Forensics for the Health Sciences Applications in Practice and Research Andriani Daskalaki (Max Planck Institute for Molecular Genetics, Germany) Medical Information Science Reference • copyright 2011 • 418pp • H/C (ISBN: 9781609604837) • US $245.00 (our price) Cyber Security, Cyber Crime and Cyber Forensics Applications and Perspectives Raghu Santanam (Arizona State University, USA) M. Sethumadhavan (Amrita University, India) and Mohit Vi- rendra (Brocade Communications Systems, USA) Information Science Reference • copyright 2011 • 296pp • H/C (ISBN: 9781609601232) • US $180.00 (our price) Handbook of Research on Computational Forensics, Digital Crime, and Investigation Methods and Solutions Chang-Tsun Li (University of Warwick, UK) Information Science Reference • copyright 2010 • 620pp • H/C (ISBN: 9781605668369) • US $295.00 (our price) Homeland Security Preparedness and Information Systems Strategies for Managing Public Policy Christopher G. Reddick (University of Texas at San Antonio, USA ) Information Science Reference • copyright 2010 • 274pp • H/C (ISBN: 9781605668345) • US $180.00 (our price) 701 E. Chocolate Ave., Hershey, PA 17033 Order online at www.igi-global.com or call 717-533-8845 x100 To place a standing order for titles released in this series, contact: [email protected] Mon-Fri 8:00 am - 5:00 pm (est) or fax 24 hours a day 717-533-8661 Editorial Advisory Board ImadAlSaeed,Colorado Technical University, USA LeeRoyBronner,Morgan State University, USA DarrellBurrell,Florida Institute of Technology, USA MiguelCrespo,Mandiant, A FireEye Company, USA ShawnMurray,United States European Command, Germany FestusOnyegula,United States Department of Agriculture, USA WesleyPhillips,Strayer University, USA JamesSimonton,The University of Tennessee Space Institute, USA  Table of Contents Foreword.............................................................................................................................................xvi Preface...............................................................................................................................................xviii Chapter 1 ABriefReviewofNewThreatsandCountermeasuresinDigitalCrimeandCyberTerrorism............1 Maurice Dawson, University of Missouri – St. Louis, USA Chapter 2 MobileDevices:TheCaseforCyberSecurityHardenedSystems.........................................................8 Maurice Dawson, University of Missouri – St. Louis, USA Jorja Wright, Florida Institute of Technology, USA Marwan Omar, Nawroz University, Iraq Chapter 3 SecurityThreatsonMobileDevices.....................................................................................................30 Lukáš Aron, Brno University of Technology, Czech Republic Chapter 4 TheHumanFactorinMobilePhishing.................................................................................................53 Rasha Salah El-Din, University of York, UK Paul Cairns, University of York, UK John Clark, University of York, UK Chapter 5 SecurityIssuesinMobileWirelessAdHocNetworks:AComparativeSurveyofMethodsand TechniquestoProvideSecurityinWirelessAdHocNetworks............................................................66 Arif Sari, European University of Lefke, Cyprus Chapter 6 LegalIssues:SecurityandPrivacywithMobileDevices.....................................................................95 Brian Leonard, Alabama A&M University, USA Maurice Dawson, University of Missouri – St. Louis, USA    Chapter 7 SurveyinSmartphoneMalwareAnalysisTechniques........................................................................105 Moutaz Alazab, Isra University, Jordan Lynn Batten, Deakin University, Australia Chapter 8 TrustManagementinMobileAdHocNetworksforQoSEnhancing................................................131 Ryma Abassi, City of Communication Technologies, Tunisia Chapter 9 InsiderThreats:DetectingandControllingMaliciousInsiders..........................................................162 Marwan Omar, Nawroz University, Iraq Chapter 10 AuthorshipAnalysis:TechniquesandChallenges..............................................................................173 Athira U., LBS Center for Science and Technology, India Sabu M. Thampi, IIITMK, India Chapter 11 TheNeedforaDualistApplicationofPublicandPrivateLawinGreatBritainFollowingtheUse of“FlameTrolling”Duringthe2011UKRiots:AReviewandModel.............................................195 Ivan Mugabi, Centre for Research into Online Communities and E-Learning Systems, UK Jonathan Bishop, Centre for Research into Online Communities and E-Learning Systems, UK Chapter 12 NativeLanguageIdentification(NLID)forForensicAuthorshipAnalysisofWeblogs....................213 Ria Perkins, Aston University, UK Chapter 13 TheCriticalNeedforEmpoweringLeadershipApproachesinManagingHealthCareInformation SecurityMillennialEmployeesinHealthCareBusinessandCommunityOrganizations.................235 Darrell Norman Burrell, Florida Institute of Technology, USA Darryl Williams, Walden University, USA Taara Bhat, George Mason University, USA Clishia Taylor, National Graduate School of Quality Management, USA Chapter 14 LearningManagementSystems:UnderstandandSecureYourEducationalTechnology..................253 Sharon L. Burton, American Meridian University, USA Rondalynne McClintock, Claremont Graduate University, USA Darrell N. Burrell, Florida Institute of Technology, USA Kim L. Brown-Jackson, National Graduate School of Quality Management, USA Dustin Bessette, National Graduate School of Quality Management, USA Shanel Lu, National Graduate School of Quality Management, USA  Chapter 15 TheInnovationandPromiseofSTEM-OrientedCybersecurityCharterSchoolsinUrbanMinority CommunitiesintheUnitedStatesasaTooltoCreateaCriticalBusinessWorkforce.......................271 Darrell Norman Burrell, Florida Institute of Technology, USA Aikyna Finch, Strayer University, USA Janet Simmons, The National Graduate School of Quality Management, USA Sharon L. Burton, Florida Institute of Technology, USA Chapter 16 Communication,Technology,andCyberCrimeinSub-SaharanAfrica............................................286 Dustin Bessette, National Graduate School of Quality Management, USA Jane A. LeClair, National Cybersecurity Institute at Excelsior College, USA Randall E. Sylvertooth, National Cybersecurity Institute at Excelsior College, USA Sharon L. Burton, Florida Institute of Technology, USA Related References............................................................................................................................298 Compilation of References...............................................................................................................328 About the Contributors....................................................................................................................359 Index...................................................................................................................................................366 Detailed Table of Contents Foreword.............................................................................................................................................xvi Preface...............................................................................................................................................xviii Chapter 1 ABriefReviewofNewThreatsandCountermeasuresinDigitalCrimeandCyberTerrorism............1 Maurice Dawson, University of Missouri – St. Louis, USA Cybersecurityisbecomingthecornerstoneofnationalsecuritypoliciesinmanycountriesaroundthe worldasitisaninteresttomanystakeholders,includingutilities,regulators,energymarkets,government entities,andeventhosethatwishtoexploitthecyberinfrastructure.Cyberwarfareisquicklybecoming themethodofwarfareandthetoolofmilitarystrategists.Additionally,itishasbecomeatoolfor governmentstoaidorexploitfortheirownpersonalbenefits.Forcyberterroriststherehasbeenan overwhelminglyabundanceofnewtoolsandtechnologiesavailablethathaveallowedcriminalactsto occurvirtuallyanywhereintheworld.Thischapterdiscussesemerginglaws,policies,processes,and toolsthatarechangingthelandscapeofcybersecurity.Thischapterprovidesanoverviewoftheresearch tofollowwhichwillprovideanindepthreviewofmobilesecurity,mobilenetworks,insiderthreats,and variousspecialtopicsincybersecurity. Chapter 2 MobileDevices:TheCaseforCyberSecurityHardenedSystems.........................................................8 Maurice Dawson, University of Missouri – St. Louis, USA Jorja Wright, Florida Institute of Technology, USA Marwan Omar, Nawroz University, Iraq Mobiledevicesarebecomingamethodtoprovideanefficientandconvenientwaytoaccess,findand shareinformation;however,theavailabilityofthisinformationhascausedanincreaseincyberattacks. Currently,cyberthreatsrangefromTrojansandvirusestobotnetsandtoolkits.Presently,96%ofmobile devicesdonothavepre-installedsecuritysoftwarewhileapproximately65%ofthevulnerabilitiesare foundwithintheapplicationlayer.Thislackinsecurityandpolicydrivensystemsisanopportunityfor maliciouscyberattackerstohackintothevariouspopulardevices.Traditionalsecuritysoftwarefoundin desktopcomputingplatforms,suchasfirewalls,antivirus,andencryption,iswidelyusedbythegeneral publicinmobiledevices.Moreover,mobiledevicesareevenmorevulnerablethanpersonaldesktop computersbecausemorepeopleareusingmobiledevicestodopersonaltasks.Thisreviewattemptsto displaytheimportanceofdevelopinganationalsecuritypolicycreatedformobiledevicesinorderto protectsensitiveandconfidentialdata. 

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.