Computer Science and IT
58 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Computer Science and IT , livre ebook

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
58 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

When Ben discovers that his Facebook page has been changed, he is worried. Then someone sends emails from his account! Have his personal and work files been hacked? This book looks at the topics of computer science and information and communications technology to explain how Ben's laptop and his company's network have been compromised, and how the systems administrator, network manager, and police investigators can track down the person carrying out the cyber attack.

Sujets

ICT

Informations

Publié par
Date de parution 12 septembre 2013
Nombre de lectures 1
EAN13 9781406268522
Langue English
Poids de l'ouvrage 12 Mo

Informations légales : prix de location à la page 0,0347€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.

Extrait

A N AT O M Y O F A N I N V E S T I G AT I O N
Computer Science and IT: INVESTIGATINGA CYBER ATTACK
Anne Rooney
Raintree is an imprint of Capstone Global Library Limited, a company incorporated in England and Wales having its registered oîce at 7 Pilgrim Street, London, EC4V 6LB – Registered company number: 6695582
To contact Raintree, please phone 0845 6044371, fax + 44 (0) 1865 312263, or email myorders@ raintreepublishers.co.uk.
Text © Capstone Global Library Limited 2014 First published in hardback in 2014 The moral rights of the proprietor have been asserted.
All rights reserved. No part of this publication may be reproduced in any form or by any means (including photocopying or storing it in any medium by electronic means and whether or not transiently or incidentally to some other use of this publication) without the written permission of the copyright owner, except in accordance with the provisions of the Copyright, Designs, and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency, Saron House, 6–10 Kirby Street, London EC1N 8TS (www.cla.co.uk). Applications for the copyright owner’s written permission should be addressed to the publisher.
Edited by Andrew Farrow, Adam Miller, and Adrian Vigliano Designed by Richard Parker Original illustrations © HL Studios Illustrated by James Stayte (pages 4–7); HL Studios Picture research by Ruth Blair Production by Sophia Argyris Originated by Capstone Global Library Ltd Printed and bound in China by CTPS
ISBN 978 1 406 26102 8 17 16 15 14 13 10 9 8 7 6 5 4 3 2 1
British Library Cataloguing in Publication Data Rooney, Anne Computer science and IT: investigating a cyber attack. – (Anatomy of an investigation)
A full catalogue record for this book is available from the British Library.
AcknowledgementsWe would like to thank the following for permission to reproduce photographs:Alamy pp. 16 (© Ian Shaw), 33 (© Marmaduke St. John), 43 (© Nikita Buida), 46 (© aberCPC); Corbis pp. 11 (© DB Apple/ dpa), 27 (© Corbis), 42 (© Ramin Talaie); Getty Images pp. 8 (Florence Delva), 19 (William Thomas Cain), 22 (ColorBlind Images), 25 (Jiji Press/AFP), 37 (Chris Jackson), 39 (Betsie Van der Meer), 40 (Alan Weller/ Bloomberg); Shutterstock pp. 9 (© Angela Waye), 12 (© Dmitry Kalinovsky), 14 (© Elena Elisseeva), 15(© Dmitriy Shironosov), 17 (© Ermolaev Alexander), 21 (© Arno van Dulmen), 34 (© dwphotos), 35 (© Franz Pfluegl), 38 (© YanLev); Superstock pp. 13 (Ambient Images Inc.), 36 (imagebroker.net).
Cover photograph of computer hackers using a computer reproduced with permission of Corbis (© Ocean).
We would like to thank Mark Clarkson for his invaluable help in the preparation of this book.
Every effort has been made to contact copyright holders of any material reproduced in this book. Any omissions will be rectified in subsequent printings if notice is given to the publisher.
Disclaimer All the internet addresses (URLs) given in this book were valid at the time of going to press. However, due to the dynamic nature of the internet, some addresses may have changed, or sites may have changed or ceased to exist since publication. While the author and publisher regret any inconvenience this may cause readers, no responsibility for any such changes can be accepted by either the author or the publisher.
Contents
Signs of trouble...................................................................... 4
Attack! ................................................................................... 8
Keeping information safe.....................................................14
Confirming the attack .......................................................... 20
Assessing the damage.......................................................... 26
Forensic computing.............................................................. 36
A secure future..................................................................... 44
Investigation: how to be anonymous .................................... 48
Timeline ............................................................................... 50
Glossary ............................................................................... 52
Find out more....................................................................... 54
Index .................................................................................... 56
Some words are printed in bold,like this. You can find out what they mean by looking in the glossary on page 52.
Sig
4
ns o
f
tr
o
After a long day at work, Ben relaxes with his laptop and a pizza. But it is not going to be the peaceful evening he had hoped for...
What’s this? I didn’t put that on my page!
u
bl
e
Last night  when the guys were here  where was my laptop?Is this a joke?
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents