| Title Page | 2 |
---|
| Preface | 5 |
---|
| Organization | 6 |
---|
| Table of Contents | 8 |
---|
| Cybercrime and Digital Forensics Investigation | 11 |
---|
| Global E-Security | 12 |
| Introduction | 12 |
| Cybercrime | 13 |
| Money Laundering | 14 |
| Voice over Internet Protocol (VoIP) | 14 |
| Using Unsecured Networks | 16 |
| Spam | 17 |
| Conclusions | 18 |
| How to Find Exculpatory and Inculpatory Evidence Using a Circular Digital Forensics Process Model | 19 |
| Introduction | 19 |
| Previous Work | 19 |
| A Process Model for Inculpatory and Exculpatory Cases | 20 |
| Initialization | 20 |
| Evidence Collection | 21 |
| Evidence Examination and Analysis | 22 |
| Presentation | 24 |
| Case Termination | 24 |
| Process-Wide Activities | 25 |
| Documentation | 25 |
| Preservation | 25 |
| Management | 25 |
| Tools Usage | 25 |
| Conclusion | 25 |
| References | 26 |
| Identity Theft: A Study in Contact Centres | 27 |
| Introduction | 27 |
| Definition | 27 |
| Mechanisms | 28 |
| Identity Theft within Contact Centres | 29 |
| Research Method | 29 |
| Results | 30 |
| The Market for Customer’s Details | 30 |
| Security Practices within Contact Centres | 30 |
| Conclusions | 33 |
| References | 33 |
| A Reasoning Agent for Credit Card Fraud on the Internet Using the Event Calculus | 35 |
| Introduction | 35 |
| Transactions | 36 |
| Introduction to Card-Not-Present Transactions | 36 |
| Merchant Goals | 38 |
| Modelling Transaction Security | 39 |
| Background | 39 |
| The Event Calculus | 40 |
| Discovering Attacks | 41 |
| Internet Credit Card Transaction Scenario | 42 |
| Purchase Scenario | 42 |
| Purchase Code | 43 |
| Reasoning about Fraud | 44 |
| Conclusions and Further Work | 46 |
| References | 47 |
| Trends in Smartcard Fraud | 49 |
| Introduction | 49 |
| Types of Card Fraud | 50 |
| Counterfeit Card Fraud | 50 |
| Skimming | 51 |
| Lost and Stolen Fraud | 51 |
| Mail Non-receipt | 52 |
| Card Not Present | 52 |
| Card ID Theft | 52 |
| Likely Trends | 52 |
| Stakeholders | 53 |
| Risk Assessment | 54 |
| Summary and Conclusions | 55 |
| References | 56 |
| Tracking Online Trails | 57 |
| Introduction | 57 |
| Tracking Internet Trails | 58 |
| Difficulties in Locating Trails | 60 |
| Changing the Sender’s Address | 60 |
| Using Online Proxy Servers | 61 |
| Using Online Anonymous Services | 61 |
| Using Vulnerable Third Party Computers | 61 |
| Points to Consider | 61 |
| Conclusion | 62 |
| References | 62 |
| Evaluation of Tools for Protection of Interest against Hacking and Cracking | 63 |
| Voice and Video over Internet Protocols Security | 68 |
---|
| Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks | 69 |
| Introduction | 69 |
| Description of Attacks | 69 |
| Testing SIP Dialog Verification | 70 |
| Discussion of Results | 71 |
| Conclusion | 72 |
| References | 72 |
| Covert Channels in SIP for VoIP Signalling | 73 |
| Introduction | 73 |
| VoIP Communication Flow | 74 |
| VoIP Signalling Covert Channels Overview and New Insights | 75 |
| IP/TCP/UDP Protocols Steganography | 75 |
| SIP/SDP Protocols Steganography | 76 |
| Evaluation of Total Covert Data Transferred in VoIP Signalling | 79 |
| Conclusions | 79 |
| References | 80 |
| Secure Recognition of Voice-Less Commands Using Videos | 81 |
| Introduction | 81 |
| Mouth Movement Representation | 83 |
| Feature Extraction | 84 |
| Classification | 84 |
| Experiments | 85 |
| Results and Discussion | 86 |
| Summary | 87 |
| References | 88 |
| An Extended Secret Sharing Scheme for Color Images with Fixed Pixel Expansion | 89 |
| Introduction | 89 |
| Colored Visual Cryptography | 90 |
| Verheul and Tilborg’s Basic Colored Secret Sharing Scheme | 90 |
| Rijmen and Preneel’s Colored Secret Sharing Scheme | 91 |
| Bit-Level Colored Secret Sharing | 91 |
| Extended Visual Cryptography | 92 |
| Chang, Tsai, Chen’s Scheme for Colored Images | 92 |
| Chang, Yu’s Scheme for Gray Images | 93 |
| Proposed Scheme for Colored Images | 93 |
| Hiding Algorithm | 94 |
| Recovering Algorithm | 95 |
| Results | 95 |
| Conclusion | 96 |
| References | 96 |
| Computer Security | 98 |
---|
| Experimental Results on Algebraic Analysis of Trivium and Tweaked Trivium | 99 |
| Introduction | 99 |
| Brief Description of Trivium | 100 |
| Solving Algebraic E
|