Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet150/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   146   147   148   149   150   151   152   153   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

142
CHAPTER 11
ICT as a protection tool against child exploitation
victims of cross-border trafficking would be helpful. The research goes on to propose 
that the MCA would have a role in actively supporting prosecution. While these are 
all desirable, it is overly ambitious and unnecessary to try to coordinate all these 
activities in one technological system or database. Instead, in-country (national) sys-
tems need to be strengthened to address areas like child welfare and justice. Each 
case recorded in the cross-border response system should remain open until the 
child’s rights and needs are known to have been fully met. This can take many years 
and may span a series of interventions including shelter home (
Figure 11.2
).
The report draws a conclusion that indicates the requirement for a technological 
solution, and provides a strategy for delivering this, but reiterates the complex social, 
economic, legal, and political setting in which such technology needs to, and will be, 
deployed.
This recognition leads us back to the three key issues identified at the outset.
• Information and awareness about the issues
• Legal framework and difficulties dealing with cross border issues and globally 
agreed methods of working
• Technical challenges (information flow, access and processing)
CBCT RESPONSE SYSTEM
One of the options considered by the research was a centralized CBCT response 
system dedicated to addressing the needs of children who have been trafficked across 
a border. For this, a regional database, with effective national alerting mechanisms, 
needs to be put in place. Members of the public, community centers, etc., can report 
missing children; these are initially investigated by the police in the source coun-
try, who can then activate in-country and cross-border alert requests through the 
centralized regional system, on the basis of their analysis of a missing child report. 
This model focuses specifically on cross-border trafficking of children.
Hacking
Viruses and worms
Vandalism
Theft and fraud
Danial of service attacks
Theft of data
Copying data
Alteration of data
Hardware failure
Software failure
Tapping
Sniffing
Message alteration
Theft and fraud
Unauthorised
access
errors
Clients (users)
Communication lines
Servers
Hardware, Operating Systems,
Application Software
FIGURE 11.2
Security challenges and vulnerabilities in a typical MCA network.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   146   147   148   149   150   151   152   153   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish