.

Introduction to Cybercrime 

• Definition and History
• Cybercrime and Information Security
• Who are Cybercriminals and their classifications
• The Legal Perspectives
• An Indian Perspective
• Cybercrime and the Indian IT Act 2000
• A Global Perspective on Cybercrimes
• Survival for the Netizens
• Concluding Remarks and Way Forward to Further Chapters

Cyber Offenses

• How Criminals Plan the Attacks
• Social Engineering
• Cyberstalking
• Cybercafe and Cybercrimes
• Botnets
• Attack Vector
• Cloud Computing

Cybercrime and Wireless Devices 

• Proliferation of Mobile and Wireless Devices
• Trends in Mobility
• Credit Card Frauds in Mobile and Wireless Computing Era
• Security Challenges Posed by Mobile Devices
• Registry Settings for Mobile Devices
• Authentication Service Security
• Attacks on Mobile/Cell Phones
• Security Implications for Organizations
• Organizational Measures for Handling Mobile
• Organizational Security Policies and Measures in Mobile Computing Era
• Laptops

Tools and Methods Used in Cybercrime 

• Proxy Servers and Anonymizers
• Phishing
• Password Cracking
• Keyloggers and Spywares
• Virus and Worms
• Trojan Horses and Backdoors
• Steganography
• DoS and DDoS Attacks
• SQL Injection
• Buffer Overflow
• Attacks on Wireless Networks

Phishing and Identity Theft 

• Phishing
• Identity Theft (ID Theft)

The Legal Perspectives 

• Cybercrime and the Legal Landscape around the World
• Cyberlaws in India
• The Indian IT Act
• Challenges to Indian Law and Cybercrime Scenario in India
• Consequences of Not Addressing the Weakness in Information Technology Act
• Digital Signatures and the Indian IT Act
• Amendments to the Indian IT Act
• Cybercrime and Punishment

Computer Forensics 

• Historical Background of Cyber Forensics
• Digital Forensics Science
• The Need for Computer Forensics
• Cyber Forensics and Digital Evidence
• Forensics Analysis of E-Mail
• Digital Forensics Life Cycle
• Chain of Custody Concept
• Network Forensics
• Approaching a Computer Forensics Investigation
• Setting up a Computer Forensics Laboratory
• Computer Forensics and Steganography
• Relevance of the OSI 7 Layer Model to Computer Forensics
• Forensics and Social Networking Sites
• Computer Forensics from Compliance Perspective
• Challenges in Computer Forensics
• Special Tools and Techniques
• Forensics Auditing
• Anti Forensics

Forensics of Hand-Held Devices 

• Understanding Cell Phone Working Characteristics
• Hand-Held Devices and Digital Forensics
• Toolkits for Hand-Held Device Forensics
• Forensics of iPods and Digital Music Devices
• An Illustration on Real Life Use of Forensics
• Techno-Legal Challenges with Evidence from Hand-Held Devices
• Organizational Guidelines on Cell Phone Forensics

Cybersecurity and Organizations 

• Cost of Cybercrimes and IPR Issues
• Web Threats for Organizations
• Security and Privacy Implications from Cloud Computing
• Social Media Marketing
• Social Computing and the Associated Challenges for Organizations
• Protecting People’s Privacy in the Organization
• Organizational Guidelines for Internet Usage

Safe Computing Guidelines and Computer Usage Policy 

• Incident Handling
• Forensics Best Practices for Organizations
• Media and Asset Protection
• Importance of Endpoint Security in Organizations

Cybercrime and Cyberterrorism

• Intellectual Property in the Cyberspace
• The Ethical Dimension of Cybercrimes
• The Psychology, Mindset and Skills of Hackers and Other Cybercriminals
• Sociology of Cybercriminals
• Information Warfare

Cybercrime Case Study 

• Real-Life Examples
• Mini-Cases
• Illustrations of Financial Frauds in Cyber Domain
• Digital Signature-Related Crime Scenarios
• Digital Forensics Case Illustrations
• Online Scams