Cover page -- Halftitle page -- Series page -- Title page -- Copyright page -- Dedication page -- Contents -- CHAPTER ONE Introduction -- CHAPTER TWO History of Cybercrime -- CHAPTER THREE Types and Frequency of Cybercrime -- CHAPTER FOUR Amount of Cybercrime -- CHAPTER FIVE Law Enforcement -- CHAPTER SIX Organized Cybercrime -- CHAPTER SEVEN Cyberterrorism and Terrorists Online -- CHAPTER EIGHT Cyberwar -- CHAPTER NINE Domestic Response -- CHAPTER TEN International Response -- CHAPTER ELEVEN Conclusion -- Appendix Timeline of Significant Events -- Selected Bibliography -- Index -- About the Authors.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
The purpose of this article is to make the reader aware of the concept of cyber security and of the importance of establishing cyber data protection systems that we currently manage. Cyber-attacks have experienced a continuous upward trend in recent years, being targeted at both personal computer systems, computer systems managed by companies or computer systems managed by state institutions, as such cyber security has become a necessity for any user, provider, or consumer of cyber data.
Intro -- Contents -- Abbreviations -- List of Figures -- List of Table -- Introduction -- Data Protection and Data Security -- How Computers Communicate with Each Other -- Example: Notation of MAC-Addresses -- Example -- What Can Happen to Data? -- Hazards in the Technical Environment -- Dangerous Software -- 6.1 The Trojan Horse -- 6.2 The Virus -- 6.3 The Logical Bomb -- 6.4 The Keylogger -- 6.5 The Sniffer -- 6.6 The Back Door -- Removable Media, USB Devices, Smartphones and Other Mobile Devices -- Telephone Systems -- The Greatest Danger in a Digitalized World -- Data Destruction -- Data Backup and Restore -- Encryption -- Website Hacking -- Common Security Problems -- 14.1 Working Consoles that Are Not Locked -- 14.2 Printer Stations and Multifunction Devices -- 14.3 Working with Administrator Privileges -- 14.4 The Internet of Things and Industrial Control Systems -- Identification of Computers and IP Addresses -- The Firewall -- The Router -- Configuration of Security Systems -- The Demilitarized Zone -- Organizational Data Security -- Notes -- Closing Words -- Literature -- Further Reading -- Index.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
In January 2020, the World Health Organization announced an outbreak of SARS-CoV2, which caused COVID-19 coronavirus disease. Soon, a continuous outbreak of coronavirus infection was declared a pandemic. This situation has led to an increase in cybercrime. Cybercriminals did not stray from the situation and used the pandemic to commit various digital frauds and cyberattacks. As a result, the objective of the investigation was to analyze computer crimes at the COVID-19 scene and identify their social and legal consequences. This is a documentary-based investigation. It is concluded that, security standards have deteriorated in the context of forty social as many organizations were not prepared for remote work and the number of victims of cybercrime will only grow soon. International organizations and law enforcement agencies in many countries issue many recommendations to prevent digital criminal acts against businesses and citizens. This situation also prompted active legislation around the world to deal with the crisis. Most of the rules adopted in recent months are likely to be derogated.
This article examines the criminal legislation of Russia and foreign countries, which regulate liability for the Commission of computer crimes. The author reveals the advantages and disadvantages of the Russian legislation regarding the criminalization of computer crimes. Put forward proposals on the improvement of criminal law articles 272-274 of the criminal code.
In: Proceedings of Scientific Conference "New Challenges related to EU`s Internal Security" (5th ed.), held by Doctoral Schools from Alexandru Ioan Cuza Police Academy, Bucharest, Romania, 2016
Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of a cyber forensic investigation. The authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine.Updating and expanding information on concealment techniques, new technologies
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Darba ietvaros tiek aplūkots kibernoziegumu tiesiskais regulējums un tā aktuālās problēmas. Tiek analizēts, vai ir nepieciešams izstrādāt vispārsaistošu kibernoziegumu definīciju, kā arī salīdzinātas dažādos tiesību avotos sniegtās kibernoziegumu funkcionālās definīcijas. Attiecībā uz kriminālatbildību par autortiesību un blakustiesību pārkāpumiem tiek analizētas interneta sniegtās priekšrocības šādu pārkāpumu izdarīšanā, kā arī iespējamie tiesiskie risinājumi. Darba ietvaros tika aplūkotas problēmas cīņā ar prettiesisku materiālu izplatīšanu datortīklos, kā arī analizēti argumenti attiecībā uz nepieciešamību ierobežot internetā pastāvošo vārda brīvību. Darba ietvaros tika secināts, ka obligāts priekšnoteikums šādu nodarījumu efektīvai apkarošanai ir vienots starptautiskais regulējums, kas ļautu novērst interneta kā bezrobežu telpas sniegtās priekšrocības prettiesisko darbību veikšanā. Uzmanība tika pievērsta arī kriminālatbildībai par privātās dzīves aizskārumiem internetā un noziedzīgiem nodarījumiem pret automatizētajām datu apstrādes sistēmām, kas atšķirībā no pārējiem kibernoziegumiem, kas pastāvējuši jau iepriekš, ir radušies reizē ar datortīkliem un ir iespējami tikai šādā vidē. Darba ietvaros sniegtas idejas gan atsevišķu normu interpretācijai, gan priekšlikumi par atsevišķu normu izslēgšanu no Krimināllikuma. ; In this paper author analyzes actual issues of criminal law in cyberspace. Author analyzes whether there is a need to develop a legal definition of cybercrime, and compares different legal sources that provide functional definitions for term 'cybercrime'. In the sphere of copyright and related rights violations author examines possibilities offered by the use of Internet and especially peer to peer exchange programms and proposes possible legislative solutions. Regarding Content related offences in computer networks author analyzes the arguments for setting appropriate borders for freedom of expression in internet. It was concluded that a prerequisite for effective eradication of such content related offences is a common international regulation that seriously bothers criminals to use Internet as a borderless space for bypassing national laws of their location. Attention was also given to criminal liability for breaches of privacy on the Internet, and to offenses against the automated data processing systems, which unlike the other sorts of cybercrime, which existed before, have appeared along with computer networks and are possible only in such an environment. In this paper author offers ideas for interpretation of existing rules and proposes to adopt changes in separate articles of The Criminal Law.