Chapter 9. Understanding E-mail and Internet Crimes

Topics we'll investigate in this chapter:

▪ Understanding E-mail and E-mail Forensics
▪ Tracing a Domain Name or IP Address
▪ Understanding Browser Security
▪ Investigating Child Pornography and Other Crimes That Victimize Children
▪ Cyberterrorism
Summary
Frequently Asked Questions

Introduction

A number of tools are used to access resources on the Internet, and each of them can be used to commit a crime or potentially become a victim. By accessing the Internet, e-mail clients and Internet browsers can expose computers to viruses and spam, and can expose the people using those computers to various forms of cybercrime.
The Internet is widely used as a source of information and enjoyment, but it is as ...

Get Scene of the Cybercrime, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.