Front cover image for Cybercrime : an encyclopedia of digital crime

Cybercrime : an encyclopedia of digital crime

Nancy E. Marion (Author), Jason Twede (Author)
"This title has been through a marketing Launch Meeting and the information in this Transmittal form has been approved. This title has NOT been through a marketing Launch Meeting and the information in this Transmittal form has NOT been finalized"-- Provided by publisher
eBook, English, 2020
ABC-Clio, Santa Barbara, California, 2020
1 online resource (xxx, 485 pages)
9781440857355, 1440857350
1141021467
Abandonware
Abene, Mark
Advanced persistent threats
Advanced Research Projects Agency Network
Adware
Anonymous
Ashley Madison breach
Assange, Julian
Auernheimer, Andrew Alan Escher
Awareness
Backdoor
Banking attacks
Biometrics
Bitcoin
Black-Hat hackers
Blankenship, Loyd
Bots and botnets
Bypass
Calce, Michael
CAN-SPAM Act of 2003
Capital One breach
Carberp
Center for Internet Security
Chaney, Christopher
Chaos Computer Club
Child pornography
China
Cleary, Ryan
Code red
Comprehensive National Cybersecurity Initiative
Computer Fraud and Abuse Act of 1986
Continuous Diagnostics and Mitigation (CDM)
Copyright infringement
Corporate account takeover
Costs of cybercrime
Council of Europe Cybercrime Convention
Cracker and cracking
Craigslist killers
Credit card fraud
Cryptocurrency
Cryptography
Cyberbullying
Cybersecurity
Cybersecurity Act of 2012
Cybersecurity and Infrastructure Security Agency (CISA)
Cybersecurity Enhancement Act of 2014
Cybersecurity Workforce Assessment Act of 2015
Cybersquatting
Cyberstalking
Cyber-Surveillance malware
Cyberterrorism
Cyberwarfare
Dark web
Data leakage
Data sovereignty
DEF CON
Denial-of-service attack (DoS)
Department of Defense, attacks on
Digital currency
Digital Millennium Copyright Act
Digital rights management
Digital signatures
Distributed Denial-of-Service Attack (DDoS)
Domain name system cache poisoning
Doxing
Draper, John
Dread Pirate Roberts (Ulbricht, Ross; 1984-)
Dreamboard
Drink or Die
Drug trafficking
Dumpster diving
Economy, effects on
Einstein
Electronic Frontier Foundation
E-mail bomb
E-mail-related crimes
Encryption
End user license agreement
Engressia, Josef Carl, Jr
Entertainment, effects on
Equifax breach
Ethics
European Cybercrime Center
Exploit kit
Federal Bureau of Investigation
Federal Information Security Management Act of 2002
Financial crimes
Firewall
Florida Computer Crime Act of 1978
414s
Fraud
Gambling
GameOver Zeus Botnet
globalHell (gH)
Hacker and hacking
Hacktivism
Hate crime
Health care, effects on
Hijacking
Identity theft
ILOVEYOU virus
Immigration and Customs Enforcement
Insurance
International issues
Interpol
Keystroke monitoring
Legion of Doom
Legislation
Levin, Vladimir
Lizard Squad
Lloyd, Timothy
Logic bomb
LulzSec
Malware
Manning, Chelsea
Masters of deception
Melissa Worm
Mitnick, Kevin
Money laundering
Morris, Robert Tappan
Motives
MPack
Nakamoto, Satoshi
National Cyber Investigative Joint Task Force
National Cybersecurity Alliance
National Cybersecurity and Critical Infrastructure Protection Act of 2013
National Institute of Standards and Technology Cybersecurity Framework
News corp hacking
Nimda
North Korea
Open-Source
Operation Apothecary
Operation Aurora
Operation Innocent Images
Operation Marco Polo
Operation Olympic Games
Operation Phish Phry
Operation Shrouded Horizon
Password
Payload
Pen register
People's Liberation Army Unit 61398
Personal Data Notification and Protection Act of 2017
Personally identifying information
Pharming
Phishing
Phreaker
Piggybacking
Pile, Christopher
Plankton
Pokémon Go. Political uses
Poulsen, Kevin
President and cybercrime
Pretty Good Privacy
Prevention
Prism
Privacy
Profits from cybercrime
Public domain
Punishment
Ransomware
Reputation, effects on
Revenge porn
Rootkit
Russia
Russian Business Network
Scavenging
Secret Service
Sexting
Silk Road
Simulation
Skimmer
Smart Card
Sniffer
Snowden, Edward
Social engineering
Social media
Sony Pictures Entertainment hack
Spam
Spoofing
Spyware
State actor
Storm Botnet
Supervisory Control and Data Acquisition
Superzapping
Swartz, Aaron
Swatting
Symantec
Syrian Electronic Army
TeaMpoisoN
Tools
Tor (The Onion Router)
Trojan horse
Uber hack
Union Dime Savings Bank Theft
United Loan Gunmen
United States Cyber Command
Unlimited Operation
U.S. Presidential Election Interference, 2016
Vandalism
Victims of cybercrime
Virtual Private Network
Virus
Vulnerability
War Dialer
Wardriving
Welchia Worm
White-Hat Hackers
WikiLeaks
Women, effects on
Worm
Youth and cybercrime
Zero-Day attacks