SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
CompanionCDcontains:
• 3Chapters
† Chapter 10 – Cybercrime and Cyberterrorism:
Social, Political, Ethical and Psychological
Dimensions
† Chapter 11 – Cybercrime: Illustrations, Exam-
plesandMini-Cases
† Chapter12–Careersin Cybersecurity
• 23 appendices with guidelines, checklists and
handyreferencetorelevantIndianActs.
by Nina Godbole, Sunit Belapure
ABOUT THE BOOK
ABOUTTHEAUTHORS
• This book, focusing on cyberthreats and cybersecurity, provides the
much needed awareness in the times of growing cybercrime
episodes.
• Comprehensive treatment of important topic – cybersecurity to help
readersunderstandtheimplicationsofcybercrime.
• The book provides adequate orientation on laws in reference to
cybercrime and cybersecurity taking into account the Indian as well
asglobalscenario.
• Awareness created through simple practical tips and tricks,
educates readers to learn how to avoid becoming victims of
cybercrime.
• Written by InfoSec domain SME and co-authored by qualified ethical
hackingprofessionalwhoisalsoasecuritycertifiedprofessional.
• Well-presented case illustrations and examples from real life
underlinethesignificanceoftopicsaddressedineachchapter.
Nina Godbole is an author of the book Information Systems Security:
Security Management, Metrics, Frameworks and Best Practices
published by Wiley India in January 2009. She is also on the Editorial
Board of IEEE Computer Society for their IT Professional bimonthly
publications. She has published numerous articles on topics in leading
IT magazines. She has a vast work experience in the IT industry in
Software Quality Assurance, systems analysis and design, application
support services as well as application audit and IS audit. Nina is a
CIPP/IT - a privacy professional certified by the IAPP USA (International
Association of Privacy Professional) as well as a CISA (Certified
Information Systems Auditor) certified by ISACA USA (Information
Systems Audit and Control Association). She has been working with a
global IT organization for more than a decade and has been associated
with business controls, regulatory compliance and Information
Systems audit in delivery of projects. She holds a Masters Degree in
Science from IIT Bombay and MS Engineering (Computer Science)
degree from Newport University, USA. She is a key speaker at many
conferences and visiting faculty to many institutes including those
under Pune University. Nina is also an ITIL foundation certified
professional, a PMP, CQA and CSTE from QAI, USA (Quality Assurance
Institute).
Sunit Belapure has more than 8 years experience in Information
Security domain out of his total industry experience of more than 18
years. He works in the domain of ISRM (Information Security and Risk
and Management) and Information System Audit. Sunit has respective
international certifications to his credit – CISA (Certified Information
Systems Auditor) from ISACA-USA, IRCA certified ISO 27001:2005
Lead Auditor, Certified Ethical Hacker (CEH v5.0) from EC-Council-USA
and CISM (Certified Information Security Manager) from ISACA-USA.
He is a member of ISACA, USA. He engages into Compliance and
Assurance assignments (for ERP as well as for Non-ERP applications)
underISsecurityand ITGovernancedomain.Sunit isanotedspeakeron
InformationSecuritydomainatreputedinstitutesinandaroundPune.
ISBN: 978-81-265-2179-1
Pages: 636
` 449
HEAD OFFICE: 4435-36/7, Ansari Road, Daryaganj, New Delhi-110002. Tel: 91-11-43630000 Fax: 91-11-23275895. Email: csupport@wiley.com
BANGALORE: Tel: 080-23132383. Telefax: 080-23124319. Email: blrsales@wiley.com
MUMBAI: Tel: 022-27889263, 27889272. Telefax: 022-27889263. Email: mumsales@wiley.com
www.wileyindia.com
Wiley India Pvt. Ltd.
KEY FEATURES
TABLE OF CONTENTS
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
K :
L :
M :
N :
O :
P :
Q :
R :
S :
T :
U :
V :
W :
Virtual Crime
Cybercrimes Worldwide
– Trends and Patterns
Data Privacy, Data
Protection and Cybercrime
Digital Rights
Management
The Indian Information
Technology Act
The Indian Penal Code
The Indian Evidence Act
The Indian Patents Act
The Indian Trademarks
Act
The Indian Copyright Act
DSCI Security
Framework (DSF) from Data Security
Council of India
DSCI Privacy Framework
(DPF) from Data Security Council of
India
Chapterwise List of All
References
B :
C : E-Mail Security and
Etiquettes and Policy Template for
Computer and Network Usage
D : Protection Checklist for
Individuals and Organizations
Template
E :
F : Guidelines for
Computer Forensics Laboratory Set-up
and Guidance on Forensic Readiness
Activities in Organizations
G : Preservation of Digital
Crime Scene Related Photographs and
Checklist for Processing Computer
Forensic Data and Evidence
H :
I
J :
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
Appendix
List of useful Software
Utilities and Websites
List of Tools :
Vulnerability Scanning and Penetration
Testing
Guidance on
Structuring the Incidence Response
Handling Team
: List of Forensic
Equipment and Forensic Software Tools
Cybercafe Due
Diligence Questionnaire
• AuthorsareindustryprofessionalswithextensiveexperienceinthedomainofInformation Security andDataPrivacy.
• The book is aimed at individuals, students (including those doing law courses), IT professionals and legal professionals
forbuildingawarenessaboutcybercrimeandcybersecurity.
• Useful for candidates aspiring to appear for international certification exams in the domain of Information Security/IT
Securityandotherrelateddomains.
• Detailed discussion about multiple dimensions of cybersecurity – presents current scenario on cybercrime, serves as
referencebookwithrichdiscussiononallrelevantaspectsofthedomain,including cyberforensics.
• ProvidesinanutshellIndianaswellasglobalperspectiveoncyberlaws.
• Bringstoreadersusefulappendiceswithrichcontentsthatserveassupplementarymaterialtothe chapters.
• Understandingofkeyconceptsfacilitatedthroughwell-illustrateddiagrams,tablesandvignettes inside the chapters.
• Real-lifecaseillustrationsandexamplesprovidedtohelpconsolidateunderstanding oftopicspresented in eachchapter.
• Reviewquestionsandreferencematerialpointersaftereachchapter.
Inside the Book
Inside the CD
Appendices
1 Introduction to Cybercrime
2 Cyberoffences: How Criminals
Plan Them
3 Cybercrime: Mobile and Wireless
Devices
4 Tools and Methods Used in
Cybercrime
5 Phishing and Identity Theft
6 Cybercrime and Cybersecurity:
The Legal Perspectives
7 Understanding Computer
Forensics
8 Forensics of Hand-Held Devices
9 Cybersecurity: Organizational
Implications
10 Cybercrime and Cyberterrorism:
Social, Political, Ethical and
Psychological Dimensions
11 Cybercrime: Illustrations,
Examples and Mini-Cases
12 Careers in Cybersecurity
A : Glossary of
Cybersecurity Terms and Acronyms
Appendix

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi The TNS Group
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Was ist angesagt? (20)

Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cia security model
Cia security modelCia security model
Cia security model
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Social engineering
Social engineering Social engineering
Social engineering
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Threats of Public Wi-Fi
Threats of Public Wi-Fi Threats of Public Wi-Fi
Threats of Public Wi-Fi
 
Information security
Information securityInformation security
Information security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
cyber security
cyber security cyber security
cyber security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Ähnlich wie Cyber Security - Flier

Securing the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdfSecuring the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdfAltius IT
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due DiligenceShiva Bissessar
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystemkpatrickwheeler
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber securityVishal Singh
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfinfosec train
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfShivamSharma909
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxRole Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxAmrit Chhetri
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxinfosec train
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...NRBsanv
 

Ähnlich wie Cyber Security - Flier (20)

Securing the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdfSecuring the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdf
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxRole Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptxTop 5 EC-Council Certifications That You Should Look Into in 2022.pptx
Top 5 EC-Council Certifications That You Should Look Into in 2022.pptx
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 

Cyber Security - Flier

  • 1. CompanionCDcontains: • 3Chapters † Chapter 10 – Cybercrime and Cyberterrorism: Social, Political, Ethical and Psychological Dimensions † Chapter 11 – Cybercrime: Illustrations, Exam- plesandMini-Cases † Chapter12–Careersin Cybersecurity • 23 appendices with guidelines, checklists and handyreferencetorelevantIndianActs. by Nina Godbole, Sunit Belapure ABOUT THE BOOK ABOUTTHEAUTHORS • This book, focusing on cyberthreats and cybersecurity, provides the much needed awareness in the times of growing cybercrime episodes. • Comprehensive treatment of important topic – cybersecurity to help readersunderstandtheimplicationsofcybercrime. • The book provides adequate orientation on laws in reference to cybercrime and cybersecurity taking into account the Indian as well asglobalscenario. • Awareness created through simple practical tips and tricks, educates readers to learn how to avoid becoming victims of cybercrime. • Written by InfoSec domain SME and co-authored by qualified ethical hackingprofessionalwhoisalsoasecuritycertifiedprofessional. • Well-presented case illustrations and examples from real life underlinethesignificanceoftopicsaddressedineachchapter. Nina Godbole is an author of the book Information Systems Security: Security Management, Metrics, Frameworks and Best Practices published by Wiley India in January 2009. She is also on the Editorial Board of IEEE Computer Society for their IT Professional bimonthly publications. She has published numerous articles on topics in leading IT magazines. She has a vast work experience in the IT industry in Software Quality Assurance, systems analysis and design, application support services as well as application audit and IS audit. Nina is a CIPP/IT - a privacy professional certified by the IAPP USA (International Association of Privacy Professional) as well as a CISA (Certified Information Systems Auditor) certified by ISACA USA (Information Systems Audit and Control Association). She has been working with a global IT organization for more than a decade and has been associated with business controls, regulatory compliance and Information Systems audit in delivery of projects. She holds a Masters Degree in Science from IIT Bombay and MS Engineering (Computer Science) degree from Newport University, USA. She is a key speaker at many conferences and visiting faculty to many institutes including those under Pune University. Nina is also an ITIL foundation certified professional, a PMP, CQA and CSTE from QAI, USA (Quality Assurance Institute). Sunit Belapure has more than 8 years experience in Information Security domain out of his total industry experience of more than 18 years. He works in the domain of ISRM (Information Security and Risk and Management) and Information System Audit. Sunit has respective international certifications to his credit – CISA (Certified Information Systems Auditor) from ISACA-USA, IRCA certified ISO 27001:2005 Lead Auditor, Certified Ethical Hacker (CEH v5.0) from EC-Council-USA and CISM (Certified Information Security Manager) from ISACA-USA. He is a member of ISACA, USA. He engages into Compliance and Assurance assignments (for ERP as well as for Non-ERP applications) underISsecurityand ITGovernancedomain.Sunit isanotedspeakeron InformationSecuritydomainatreputedinstitutesinandaroundPune. ISBN: 978-81-265-2179-1 Pages: 636 ` 449
  • 2. HEAD OFFICE: 4435-36/7, Ansari Road, Daryaganj, New Delhi-110002. Tel: 91-11-43630000 Fax: 91-11-23275895. Email: csupport@wiley.com BANGALORE: Tel: 080-23132383. Telefax: 080-23124319. Email: blrsales@wiley.com MUMBAI: Tel: 022-27889263, 27889272. Telefax: 022-27889263. Email: mumsales@wiley.com www.wileyindia.com Wiley India Pvt. Ltd. KEY FEATURES TABLE OF CONTENTS Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix K : L : M : N : O : P : Q : R : S : T : U : V : W : Virtual Crime Cybercrimes Worldwide – Trends and Patterns Data Privacy, Data Protection and Cybercrime Digital Rights Management The Indian Information Technology Act The Indian Penal Code The Indian Evidence Act The Indian Patents Act The Indian Trademarks Act The Indian Copyright Act DSCI Security Framework (DSF) from Data Security Council of India DSCI Privacy Framework (DPF) from Data Security Council of India Chapterwise List of All References B : C : E-Mail Security and Etiquettes and Policy Template for Computer and Network Usage D : Protection Checklist for Individuals and Organizations Template E : F : Guidelines for Computer Forensics Laboratory Set-up and Guidance on Forensic Readiness Activities in Organizations G : Preservation of Digital Crime Scene Related Photographs and Checklist for Processing Computer Forensic Data and Evidence H : I J : Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix List of useful Software Utilities and Websites List of Tools : Vulnerability Scanning and Penetration Testing Guidance on Structuring the Incidence Response Handling Team : List of Forensic Equipment and Forensic Software Tools Cybercafe Due Diligence Questionnaire • AuthorsareindustryprofessionalswithextensiveexperienceinthedomainofInformation Security andDataPrivacy. • The book is aimed at individuals, students (including those doing law courses), IT professionals and legal professionals forbuildingawarenessaboutcybercrimeandcybersecurity. • Useful for candidates aspiring to appear for international certification exams in the domain of Information Security/IT Securityandotherrelateddomains. • Detailed discussion about multiple dimensions of cybersecurity – presents current scenario on cybercrime, serves as referencebookwithrichdiscussiononallrelevantaspectsofthedomain,including cyberforensics. • ProvidesinanutshellIndianaswellasglobalperspectiveoncyberlaws. • Bringstoreadersusefulappendiceswithrichcontentsthatserveassupplementarymaterialtothe chapters. • Understandingofkeyconceptsfacilitatedthroughwell-illustrateddiagrams,tablesandvignettes inside the chapters. • Real-lifecaseillustrationsandexamplesprovidedtohelpconsolidateunderstanding oftopicspresented in eachchapter. • Reviewquestionsandreferencematerialpointersaftereachchapter. Inside the Book Inside the CD Appendices 1 Introduction to Cybercrime 2 Cyberoffences: How Criminals Plan Them 3 Cybercrime: Mobile and Wireless Devices 4 Tools and Methods Used in Cybercrime 5 Phishing and Identity Theft 6 Cybercrime and Cybersecurity: The Legal Perspectives 7 Understanding Computer Forensics 8 Forensics of Hand-Held Devices 9 Cybersecurity: Organizational Implications 10 Cybercrime and Cyberterrorism: Social, Political, Ethical and Psychological Dimensions 11 Cybercrime: Illustrations, Examples and Mini-Cases 12 Careers in Cybersecurity A : Glossary of Cybersecurity Terms and Acronyms Appendix