Cybercrime and Information Technology
eBook - ePub

Cybercrime and Information Technology

The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices

  1. 384 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Cybercrime and Information Technology

The Computer Network Infrastructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices

About this book

Cybercrime and Information Technology: Theory and Practice—The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.

While many books on the market cover investigations, forensic recovery, and presentation of evidence, and others explain computer and network security, this book explores both, explaining the essential principles governing computers, wireless and mobile devices, the Internet of Things, cloud systems, and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered, investigated, and adjudicated unless they are understood.

The legal portion of the book is an overview of the legal system in the United States, including cyberlaw standards, and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case, new technologies require new statues and regulations—something the law is often slow to move on given the current speed in which technology advances.

Key Features:

  • Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices.
  • Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation.
  • Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things.
  • Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges.

Cybercrime and Information Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum, and is relevant to those studying Security Administration, Public Administrations, Police Studies, Business Administration, Computer Science, and Information Systems.

A Test Bank and chapter PowerPoint slides are available to qualified professors for use in classroom instruction.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Cybercrime and Information Technology by Alex Alexandrou in PDF and/or ePUB format, as well as other popular books in Law & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2021
eBook ISBN
9781000426922
Topic
Law
Index
Law

Chapter 1 Understanding Essential Computer Concepts

DOI: 10.4324/9780429318726-1

Objectives

After completing this chapter, the student will be able to:
  • Understand information processing in computing devices
  • Explain the difference between a Bit and a Byte
  • Understand Binary, Hexadecimal ASCII, EBCDIC, and UNICODE codes
  • Understand Boolean algebra, logic gates, and truth tables
  • Explain color depth, color models, and screen resolution
  • Understand lossy and lossless compression
  • Understand the basics of quantum computing
  • Recognize computer terminology
  • Understand the history of computers and the technology surrounding them

1.1 Understanding Computation

Conventional Computer Systems

Technological innovation is a combination of the brain’s computing power and the desire to mimic human intelligence. The progression of technology is the result of the human desire to solve problems and improve the quality of life. Electronic devices are technological advancements that correlate with our efforts to solve problems.
The computer is an electronic device that accepts input, processes data by modifying or manipulating it, stores the data for further reference, and produces output, all according to a series of instructions or commands. This group of processes is the von Neumann architecture, or von Neumann concept, published in 1945 by John von Neumann, which describes a proposed architecture for a computer. The concept depicts a stored-program computer with instruction and program data stored in the same memory.1 ā€œThe design consists of a central control, the central arithmetic and logic unit, memory, and input and output.ā€2 This concept was so powerful and valuable that our computers have always followed this model.
1 Von Neumann, John. ā€œFirst Draft of a Report on the EDVAC.ā€ IEEE Annals of the History of Computing 15, no. 4 (1993): 27–75. 2 Campbell-Kelly, Martin. Computer, student economy edition: A history of the information machine. Routledge, 2018.
All conventional computing devices still operate through these four basic functions: receiving input, processing data, storing data, and producing output.
First, the user inputs information, using an input device like a touchpad, keyboard, mouse, trackpad, microphone, or video camera. The data is converted into binary data, identified as either 0s or 1s. The central processing unit (CPU), the ā€œbrainā€ of the computer, with the help of the memory, analyzes how to display each character.
Next, the CPU manipulates the binary data and stores it in memory for further reference. The CPU processes the binary data and creates output, viewed on a screen, speaker, or printer. To view the image on a monitor, the CPU works in conjunction with a software application, or program that sends instructions to the computer’...

Table of contents

  1. Cover
  2. Half-Title
  3. Title
  4. Copyright
  5. Dedication
  6. Contents
  7. Preface
  8. Acknowledgment
  9. Author’s Bio
  10. CHAPTER 1 Understanding Essential Computer Concepts
  11. CHAPTER 2 Cybercrime in a Data-Driven and Techno-Centric Society
  12. CHAPTER 3 Understanding the U.S. Legal System
  13. CHAPTER 4 Laws, Standards, and Regulations Affecting Cybercrime
  14. CHAPTER 5 The Networking Environment
  15. CHAPTER 6 Computer Security Technology and Principles
  16. CHAPTER 7 Internet of Things (IoTs)
  17. CHAPTER 8 Mobile Devices: The Smartphone
  18. Appendix A: A Complete Text of the Computer Fraud and Abuse Act (CFAA) 18 U.S.C. § 1030.
  19. Appendix B: 17 U.S.C. § 1201 Circumvention of Copyright Protection Systems
  20. Appendix C: HIPAA §164.308 Administrative Safeguards
  21. Appendix D
  22. Appendix E: 15 U.S.C.
  23. Appendix F
  24. Appendix G
  25. Appendix H
  26. Appendix I: Valuable IT and Management Certifications
  27. Index