Cyber Security and Cyber Laws
ISBN: 9789390395750
368 pages
For more information write to us at: acadmktg@wiley.com
Description
Cyber Security and Cyber Laws gives a crystal-clear introduction to cyber security for people who do not have a technical background. This book educates on topics like cyberspace, cybercrime, cyber offense, various acts, laws, methods, and various acts, laws, methods and tools used for Cyber Security. It is enriched with the explanation of social media, botnet and the intrusion detection, relation of cyber security with industrial control systems, and the role of automation in cyber security. This book also discusses the legal and regulatory aspects of cyber security and examines the regional, national, and international regulatory responses to cyber security.
Chapter 1 Introduction to Cybercrime
1.1 Introduction
1.2 Introduction to Cybercrime
1.3 Cybercrime Definition and Origins of Cybercrime of the World
1.4 Cybercrime and Information Security
1.5 Classifications of Cybercrime
1.6 Cybercrime and the Indian IT Act, 2000
1.7 A Global Perspective on Cybercrimes
Chapter 2 Cyber Offences and Cybercrime
2.1 Introduction
2.2 Strategic Attacks
2.3 Types of Attacks
2.4 Proliferation of Mobile and Wireless Devices
2.5 Trends in Mobility Wireless Era
2.6 Security Challenges Faced by Mobile Devices
2.7 Registry Setting for Mobile Devices
2.8 Authentication Service Security
2.9 Attacks on Mobile Phones
2.10 Security Implications for Organizations
2.11 Organizational Measures for Handling Mobile Phones: Device Related Security Issues
2.12 Security Policies and Measures in Mobile Computing Era and Laptops
Chapter 3 Methods and Tools used in Cyber Line
3.1 Introduction
3.2 Password Cracking
3.3 Keyloggers and Spywares, Virus and Worms, Trojan and Backdoor, Steganography
3.5 SQL Injection and Buffer Overflow
3.6 Phishing and Identity Theft (ID Theft)
3.7 Enumeration
3.8 Attacks on Wireless Networks
Chapter 4 Concept of Cyberspace and Cyber Law
4.1 Introduction to e-Commerce
4.2 Contract Aspects in Cyber Law
4.3 Security Aspects of Cyber Law
4.4 Intellectual Property Aspect in Cyber Law and Evidence Aspect in Cyber Law
4.5 The Criminal Aspects in Cyber Law
4.6 Global Trends in Cyber Law
4.7 Legal Framework for Electronic Data Interchange Law Relating to Electronic Banking
4.8 Need for Indian Cyber Law
Chapter 5 Information Technology Act
5.1 Introduction of Cybercrime and Cybersecurity
5.2 Information Technology Act, 2000
5.3 Penalties, Adjudication and Appeals Under the Information Technology Act, 2000
5.4 Offences Under Information Technology Act, 2000
5.5 Cyber Appellate Tribunal
5.6 Information Technology Act, 2008 and Its Amendments
Chapter 6 Information Security Standard Compliances
6.1 Introduction
6.2 Sarbanes–Oxley Act (SOX)
6.3 Gramm–Leach–Bliley Act (GLBA)
6.4 Health Insurance Portability and Accountability Act (HIPAA)
6.5 Federal Information Security Management Act (FISMA)
6.6 The North American Electric Reliability Corporation (NERC)
6.7 PCI (Payment Card Industry) Compliance
6.8 ISO/IEC 27000
Summary
Review Questions
References
Appendix A
Appendix B
Index