|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
With the rapid advancement in technology, a myriad of new threats
have emerged in online environments. The broad spectrum of these
digital risks requires new and innovative methods for protection
against cybercrimes. Combating Security Breaches and Criminal
Activity in the Digital Sphere is a pivotal reference source for
the latest scholarly research on current trends in cyber forensic
investigations, focusing on advanced techniques for protecting
information security and preventing potential exploitation for
online users. Featuring law enforcement perspectives, theoretical
foundations, and forensic methods, this book is ideally designed
for policy makers, analysts, researchers, technology developers,
and upper-level students.
"Malware Forensics: Investigating and Analyzing Malicious Code"
covers the emerging and evolving field of "live forensics," where
investigators examine a computer system to collect and preserve
critical live data that may be lost if the system is shut down.
Unlike other forensic texts that discuss "live forensics" on a
particular operating system, or in a generic context, this book
emphasizes a live forensics and evidence collection methodology on
both Windows and Linux operating systems in the context of
identifying and capturing malicious code and evidence of its effect
on the compromised system.
"Malware Forensics: Investigating and Analyzing Malicious Code"
also devotes extensive coverage of the burgeoning forensic field of
physical and process memory analysis on both Windows and Linux
platforms. This book provides clear and concise guidance as to how
to forensically capture and examine physical and process memory as
a key investigative step in malicious code forensics.
Prior to this book, competing texts have described malicious code,
accounted for its evolutionary history, and in some instances,
dedicated a mere chapter or two to analyzing malicious code.
Conversely, "Malware Forensics: Investigating and Analyzing
Malicious Code" emphasizes the practical "how-to" aspect of
malicious code investigation, giving deep coverage on the tools and
techniques of conducting runtime behavioral malware analysis (such
as file, registry, network and port monitoring) and static code
analysis (such as file identification and profiling, strings
discovery, armoring/packing detection, disassembling, debugging),
and more.
* Winner of Best Book Bejtlich read in 2008
* http:
//taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
* Authors have investigated and prosecuted federal malware cases,
which allows them to provide unparalleled insight to the
reader.
* First book to detail how to perform "live forensic" techniques on
malicous code.
* In addition to the technical topics discussed, this book also
offers critical legal considerations addressing the legal
ramifications and requirements governing the subject matter
This book provides readers with a valuable reference on cyber
weapons and, in particular, viruses, software and hardware Trojans.
The authors discuss in detail the most dangerous computer viruses,
software Trojans and spyware, models of computer Trojans affecting
computers, methods of implementation and mechanisms of their
interaction with an attacker - a hacker, an intruder or an
intelligence agent. Coverage includes Trojans in electronic
equipment such as telecommunication systems, computers, mobile
communication systems, cars and even consumer electronics. The
evolutionary path of development of hardware Trojans from
"cabinets", "crates" and "boxes" to the microcircuits (IC) is also
discussed. Readers will benefit from the detailed review of the
major known types of hardware Trojans in chips, principles of their
design, mechanisms of their functioning, methods of their
introduction, means of camouflaging and detecting, as well as
methods of protection and counteraction.
This book is about cyber security. In Part 1, the author discusses
his thoughts on the cyber security industry and how those that
operate within it should approach their role with the mindset of an
artist. Part 2 explores the work of Sun Tzu's The Art of War.
An accessible introduction to the most prevalent cyber threats in
our current climate, this book discusses cyber terrorism, phishing,
and ransomware attacks, and provides advice on how to mitigate such
threats in our personal and professional lives.
The EU Data Protection Code of Conduct for Cloud Service Providers
- A guide to complianceFormally founded in 2017, the EU Data
Protection Code of Conduct for Cloud Service Providers (otherwise
known as the EU Cloud Code of Conduct; the Code) is a voluntary
code of conduct created specifically to support GDPR compliance
within the B2B (business-to-business) Cloud industry. The EU
Commission, the Article 29 Working Party (now the European Data
Protection Board (EDPB)), the EU Directorate-General for Justice
and Consumers, and Cloud-industry leaders have all contributed to
its development, resulting in a robust framework that recognises
the unique requirements of the Cloud industry. Cloud providers must
ensure that their services - which by design involve accessing and
transferring data across the Internet, exposing it to far greater
risk than data stored and processed within an organisation's
internal network - meet or exceed the GDPR's requirements in order
to provide the security and privacy that the market expects.
Organisations can achieve this via compliance to the EU Cloud Code
of Conduct. The EU Cloud Code of Conduct has already been adopted
by major Cloud service organisations, including: Microsoft; Oracle;
Salesforce; IBM; Google Cloud; Dropbox; and Alibaba Cloud. Public
and business focus on information security and data protection
continues to increase in the face of a constantly changing threat
landscape and ever-more stringent regulation, and compliance to
initiatives such as the EU Cloud Code of Conduct demonstrates to
current and potential customers that your organisation is taking
data privacy seriously, as well as strengthens your organisation's
overall approach to information security management, and defences
against data breaches. The EU Data Protection Code of Conduct for
Cloud Service Providers provides guidance on how to implement the
Code within your organisation. It explores the objectives of the
Code, and how compliance can be achieved with or without a
pre-existing ISMS (information security management system) within
the organisation. Begin your journey to EU Cloud Code of Conduct
implementation with our guide to compliance - Buy this book today!
|
|