The Open Access Publisher and Free Library
01-crime.jpg

CRIME

CRIME-VIOLENT & NON-VIOLENT-FINANCLIAL-CYBER

Posts in security
Future Crimes: Inside The Digital Underground And The Battle For Our Connected World

MAY CONTAIN MARKUP

Marc Goodman

In "Future Crimes: Inside The Digital Underground And The Battle For Our Connected World," author Marc Goodman delves into the dark and complex world of cybercrime. He explores the ways in which technology has transformed criminal activities, from hacking and identity theft to cyberterrorism and digital espionage. Goodman sheds light on the threats that the digital age poses to individuals, organizations, and governments, urging readers to become more vigilant and informed about cybersecurity. Through detailed research and gripping real-life stories, "Future Crimes" offers a compelling and sobering look at the vulnerabilities of our interconnected world.

ANCHOR BOOKS. A Division of Penguin Random House LLC New York. 2016. 601p.

The Best Damn Cybercrime and Digital Forensics Book Period

MAY CONTAIN MARKUP

By Kevin Cardwell, Timothy Clinton, Tyler Cohen, Edward Collins, James "Jim" Cornell, Michael Cross, Larry Depew, Art Ehuan, Michael Gregg, Captain Benjamin R. Jean, Kevin O'Shea, Kevin Reis ,Anthony Reyes, Sondra Schneider ,Amber Schroader, Karen Schuler, Jesse Varsalone ,Jack Wiles and Craig Wright

INTRODUCTION: “As is often the case with security compromises, it's not a matter of if your company will be compromised, but when. If I had known the employee I hired was going to resign, break into my office, and damage my computers in the span of three days, hindsight being 20/20,I would have sent notification to the security guards at the front door placing them on high alert and made sure he was not granted access to the building after he resigned. Of course, I in hindsight, I should have done a better job of hiring critical personnel .He was hired as a computer security analyst and security hacker instructor; and was (or should have been) the best example of ethical conduct.

Clearly, we see only what we want to see when hiring staff and you won't know whether an employee is ethical until a compromise occurs. Even if my blinders had been off, I would have never seen this compromise coming. It boggles the mind to think that anyone would ruin or jeopardize his career in computer security for so little. But he did break into the building and he did damage our computers, and therefore he will be held accountable for his actions, as detailed in the following forensic information. Pay attention when the legal issues are reviewed.You will learn bits and pieces regarding how to make your life easier by knowing what you really need to know "when" your computer security compromise occurs.

Computer forensics is the preservation, identification, extraction, interpretation, and documentation of computer evidence. In Chapter 9 of Cyber Crime Investigations, digital forensics is referred to as "the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law"

Syngress Publishing. Inc. Elsevier, Inc.. Burlington, MA. 2007. 727p.