Cyber Security and Digital Investigations, By: Adil Al Juneibi

Cyber Security and Digital Investigations, By: Adil Al Juneibi
sku: 619891
ACCORDING TO OUR RECORDS THIS PRODUCT IS NOT AVAILABLE NOW
$14.29
Shipping from: United Arab Emirates
   Description
The types of cybercrime perpetrated in the context of cybercrime include hacking, forgery, credit card fraud, fraud at cyber-exchange machines, transferring funds across international borders, gambling on the Internet, illicit trading of stocks and bonds of companies and multinational financial institutions, and trading in Fake or prohibited goods, and cybercrime related to cyber business interferes with money laundering by diverting dirty business into the heart of legitimate cyber business and then re-smuggling it to other difficult to control commercial fields. Combating the phenomenon of cybercrime faces several difficulties, the most important and dangerous of which is the absence of accurate statistics on the number of crimes committed, their different patterns and the size of the financial losses resulting from them, especially as they are not discovered immediately after their commission, and even the small part that is discovered does not reach the knowledge of the official authorities. Thus, the economic parameters of many countries, financial institutions and companies remain unclear, which puts many institutions of the global economy under suspicion and instability. The absence of accurate statistics on the volume of cybercrime is attributed to several factors, the most important of which are: • The protection and confidentiality enjoyed by banking transactions, the focus of cybercrime. • The speed of movement of virtual funds and cyber payment wallets. • The lack of effective mechanisms for checking the movement of cyber funds. • Multiple forms of fraud and its advanced cyber programs. • No secure codes used online. The book consists of the following chapters: Chapter One: Cyber ​​Security Chapter Two: Cyber ​​Crimes Chapter Three: Digital Investigations Chapter Four: Forensic examination of the computer and its accessories Chapter Five: Digital evidence Chapter Six: The cyber criminal justice system Chapter Seven: Big data
   Price history chart & currency exchange rate

Customers also viewed