Chapter 1: Cyberspace: The new frontier for policing?
Chapter 2: Definitions of Cyber Terrorism
The Confusion About Cyber Terrorism
Has Cyber Terrorism Ever Occurred?
Chapter 3: New and emerging threats of cyber crime and terrorism
Cyber Security Lessons not Learned from Previous ICT Innovation Cycles
Organizational Aspects not Learned From Previous ICT Innovation Cycles
Chapter 4: Police investigation processes: practical tools and techniques for tackling cyber crimes
Developing Investigative Hypothesis
Investigators Contact Management
Investigating Crime and Terror
Chapter 5: Cyber-specifications: capturing user requirements for cyber-security investigations
User Requirements and the Need for a User-Centered Approach?
Balancing Technological and Human Capabilities
Conducting User Requirements Elicitation
Capturing and Communicating User Requirements
Chapter 6: High-tech investigations of cyber crime
High-Tech Investigations and Forensics
Core Concepts of High-Tech Investigations
Chapter 7: Seizing, imaging, and analyzing digital evidence: step-by-step guidelines
Collecting Evidence for a Search Warrant
Identification of a Suspects Internet Protocol Address
Anonymizing Proxy Relay Services
Intrusion Detection Systems, Network Traffic and Firewall Logs
The VBR and BIOS Parameter Block
Recovering Deleted Information
Recovering Deleted Files and Folders
System Volume Information Folders
Chapter 8: Digital forensics education, training and awareness
Digital Forensics Laboratory Preparation and Training
Digital Anti Forensics Tools and Approaches
The Main Difficulties Faced by Law Enforcement Officers Fighting Cyber-Crime
Educational Provision for the Study of Computer Forensics
Chapter 9: Understanding the situational awareness in cybercrimes: case studies
Taxonomical Classification of Cybercrime/Cyberterrorism
Political/Publicity/Self-Actualization: The Case of the Syrian Electronic Army
The Case of the Anonymous Attacks on Scientology
Self-Actualization: The Case of “Mafiaboy”
Strategic Responses to Cyber Attacks
Chapter 10: Terrorist use of the internet
Propaganda—Indoctrination—Recruitment
Online Social Network Services
Radicalization Process on the Internet
Chapter 11: ICT as a protection tool against child exploitation
Information Awareness and Better Education
Government Responsibilities and Legal Framework
Technical Issues and Challenges
Child-Centered Information Flows
Chapter 12: Cybercrime classification and characteristics
What Are the Classifications and Types of Cybercrime?
Cyber-Attack Methods and Tools
Chapter 13: Cyber terrorism: Case studies
Case Studies—Activities in Cyberspace Attributed to Terrorist Organizations
Technological Capabilities, Intelligence Guidance, and Operational Capacity
Chapter 14: Social media and Big Data
Big Data: The Asymmetric Distribution of Control Over Information and Possible Remedies
Big Data and Social Surveillance: Public and Private Interplay in Social Control
The Role of the E.U. Reform on Data Protection in Limiting the Risks of Social Surveillance
Preserving the E.U. Data Protection Standard in a Globalized World
Chapter 15: Social media and its role for LEAs: Review and applications
Features of Social Media Users and Use
LEA Usage Scenarios for Social Media
Chapter 16: The rise of cyber liability insurance
Business Interruption Insurance
A Changing Regulatory Landscape
What Does Cyber Liability Insurance Cover?
Who Offers Cyber Liability Insurance and What Should Customers Look Out For?
Chapter 17: Responding to cyber crime and cyber terrorism—botnets an insidious threat
Botnets How Do They Work. Network Topologies and Protocols
Countermeasures for Fighting Botnets or Mitigating Botnets Effects
Conclusion and Future Trends (TOR, Mobile and Social Networks)
Technological and Economic Barriers and Issues
Progress Beyond the State-of-the-Art