Cybercrime and Information Technology
eBook - ePub

Cybercrime and Information Technology

Theory and Practice: The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices

Alex Alexandrou

Share book
  1. 384 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Cybercrime and Information Technology

Theory and Practice: The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices

Alex Alexandrou

Book details
Book preview
Table of contents
Citations

About This Book

Cybercrime and Information Technology: Theory and Practice—The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.

While many books on the market cover investigations, forensic recovery, and presentation of evidence, and others explain computer and network security, this book explores both, explaining the essential principles governing computers, wireless and mobile devices, the Internet of Things, cloud systems, and their significant vulnerabilities. Only with this knowledge can students truly appreciate the security challenges and opportunities for cybercrime that cannot be uncovered, investigated, and adjudicated unless they are understood.

The legal portion of the book is an overview of the legal system in the United States, including cyberlaw standards, and regulations affecting cybercrime. This section includes cases in progress that are shaping and developing legal precedents. As is often the case, new technologies require new statues and regulations—something the law is often slow to move on given the current speed in which technology advances.

Key Features:



  • Provides a strong foundation of cybercrime knowledge along with the core concepts of networking, computer security, Internet of Things (IoTs), and mobile devices.


  • Addresses legal statutes and precedents fundamental to understanding investigative and forensic issues relative to evidence collection and preservation.


  • Identifies the new security challenges of emerging technologies including mobile devices, cloud computing, Software-as-a-Service (SaaS), VMware, and the Internet of Things.


  • Strengthens student understanding of the fundamentals of computer and network security, concepts that are often glossed over in many textbooks, and includes the study of cybercrime as critical forward-looking cybersecurity challenges.

Cybercrime and Information Technology is a welcome addition to the literature, particularly for those professors seeking a more hands-on, forward-looking approach to technology and trends. Coverage is applicable to all forensic science courses in computer science and forensic programs, particularly those housed in criminal justice departments emphasizing digital evidence and investigation processes. The textbook is appropriate for courses in the Computer Forensics and Criminal Justice curriculum, and is relevant to those studying Security Administration, Public Administrations, Police Studies, Business Administration, Computer Science, and Information Systems.

A Test Bank and chapter PowerPoint slides are available to qualified professors for use in classroom instruction.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Cybercrime and Information Technology an online PDF/ePUB?
Yes, you can access Cybercrime and Information Technology by Alex Alexandrou in PDF and/or ePUB format, as well as other popular books in Droit & Droit pénal. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2021
ISBN
9781000426922
Edition
1
Topic
Droit
Subtopic
Droit pénal

Chapter 1 Understanding Essential Computer Concepts

DOI: 10.4324/9780429318726-1

Objectives

After completing this chapter, the student will be able to:
  • Understand information processing in computing devices
  • Explain the difference between a Bit and a Byte
  • Understand Binary, Hexadecimal ASCII, EBCDIC, and UNICODE codes
  • Understand Boolean algebra, logic gates, and truth tables
  • Explain color depth, color models, and screen resolution
  • Understand lossy and lossless compression
  • Understand the basics of quantum computing
  • Recognize computer terminology
  • Understand the history of computers and the technology surrounding them

1.1 Understanding Computation

Conventional Computer Systems

Technological innovation is a combination of the brain’s computing power and the desire to mimic human intelligence. The progression of technology is the result of the human desire to solve problems and improve the quality of life. Electronic devices are technological advancements that correlate with our efforts to solve problems.
The computer is an electronic device that accepts input, processes data by modifying or manipulating it, stores the data for further reference, and produces output, all according to a series of instructions or commands. This group of processes is the von Neumann architecture, or von Neumann concept, published in 1945 by John von Neumann, which describes a proposed architecture for a computer. The concept depicts a stored-program computer with instruction and program data stored in the same memory.1 “The design consists of a central control, the central arithmetic and logic unit, memory, and input and output.2 This concept was so powerful and valuable that our computers have always followed this model.
1 Von Neumann, John. “First Draft of a Report on the EDVAC.” IEEE Annals of the History of Computing 15, no. 4 (1993): 27–75. 2 Campbell-Kelly, Martin. Computer, student economy edition: A history of the information machine. Routledge, 2018.
All conventional computing devices still operate through these four basic functions: receiving input, processing data, storing data, and producing output.
First, the user inputs information, using an input device like a touchpad, keyboard, mouse, trackpad, microphone, or video camera. The data is converted into binary data, identified as either 0s or 1s. The central processing unit (CPU), the “brain” of the computer, with the help of the memory, analyzes how to display each character.
Next, the CPU manipulates the binary data and stores it in memory for further reference. The CPU processes the binary data and creates output, viewed on a screen, speaker, or printer. To view the image on a monitor, the CPU works in conjunction with a software application, or program that sends instructions to the computer’...

Table of contents