Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet277/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   273   274   275   276   277   278   279   280   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

275
Index
A
Active personality theory, 3
Al-Qaeda type terror groups, 126, 127
Amerithrax, 125–126
Amn al-Mujahid, 127
Ansar al Mujahideen, 124
Anti-forensics, 79
digital tools and approaches, 94–96
traditional forensics, 94
Asrar al-Dardashah, 127
Association of Chief Police Officers (ACPO), 75, 97
B
Balkan Investigative Reporting Network (BIRN), 
213
Basic Input Output System (BIOS), 81
BIOS parameter block (BPB), 82
Blackhole exploit kit, 235, 236
f
Botnets, 161
advantages, 255
Agobot, 232
Blackhole exploit kit, 235, 236
f
Conficker, 232
criminal business model, 237, 237
f
DDOS, 250, 251–252
definition, 231
diffusion, 231
DNS features, 253, 253
f
Eurograbber (
see
Eurograbber attack)
hidden services, 254, 255
f
hunting methods, 250
money flows, 238, 239
f
network topologies and protocols
C&C server, 240
centralized architecture, 241, 241
f
Command & Control (C&C) server, 240, 241
DGA, 243
IRC bot, 243
Nugache, 243
P2P network, 241, 242
f
Network Traffic Data Warehouse, 251
pillars, 253, 254
f
Porters model, 238
PPI, 238
PPU, 237–238
primary activities, 239, 240
f
protocols failure messages, 252, 252
f
SDBot, 232
TOR, 254
Watering Hole attack, 236
ZeroAccess, 247–249, 248
f
zero-day exploit, 236
Zeus platform, 233
British Psychological Society (BPS), 48
Budapest Convention, 8–9, 153
Business interruption insurance, 221–222
C
Calce, Michael, 114–115
Card-not-present (CNP) fraud, 160
Centralized Cross-Border Child Traffic (CBCT), 
141, 142–145, 145
f
Centre for Information Technology Research for the 
Interest of Society (CITRIS), 100
Child protection, ICT
child-centered actions and information flows, 
139–142, 140
f
cyber bullying, 133
Deep Web, 134
global digital network safety, 133
government responsibilities, 136
information awareness and education,
135–136
legal and policy framework, 134, 136
MCA program (
see
Missing Child Alert (MCA) 
program)
on-line pornography, 133
technical challenges, 134
United Nations Conventions on the Rights of the 
Child, 134–135
Child trafficking
anti-trafficking initiatives, 137
CBCT response system, 141, 142–145, 145
f
cross-border child trafficking, 137
definition
SAARC Trafficking Convention, 138
UN Protocol on Trafficking, 137
labor/sexual exploitation, 137
poverty, 137
push and pull factors, 137
Church of Scientology, 113–114
CL insurance. 
See
Cyber liability (CL) insurance
Closed circuit television (CCTV) system, 45
Command & Control (C&C) server, 240
Note: Page numbers followed by 
f
indicate figures and 

indicate tables.


276
Index
Communications Assistance For Law Enforcement 
Act (CALEA), 180
Communications Capabilities Development 
Programme (CCDP), 180–181
Computer forensics
anti-forensics
digital anti-forensics tools and approaches, 
94–96
traditional forensics, 94
CFM, phases, 99
computer tools and services, 93
defense lawyers, 100
digital evidence, 92
e-crimes
ACPO guidelines, 92
Fraud Act 2006, 91, 92
global cost, 91
manifestations, 91
education and training, 97–99
forensics laboratory preparation and training, 
93–94
law enforcement officers, 96–97
multi-disciplinary research centers, 100
physical evidence, 92
Computer Fraud and Abuse Act, 20
Computer Misuse Act 1990, 1, 2, 91
Conficker, 232
Contingent business interruption (CBI), 222
Council of Europe Convention on Cybercrime, 1
Creeper virus, 20
Criminal Attempts Act 1981, 91, 92
Criminal business model, 237, 237
f
Criminology, 152
Crowd-sourcing data, 209–211
Cryptocurrency, 128
Cyber bullying, 133
Cyber constables, 9
Cybercrime
botnets, 161
Budapest Convention, 153
classifications and types
active crime, 154
computer’s relationship, 154
cyber-deceptions and thefts, 155
cyber-pornography, 155
cyber-trespass, 155
passive computer crime, 154
technical and societal perspective, 155
violent impact, 155
Creeper virus, 20
criminology, 152
definition, 102, 149
EDT, 20
e-mails, 161
hacking, 158–159
harassment/bullying, 159
high-tech investigations (
see
High-tech 
investigations)
identity theft, 159–160
impact, 150, 151
t
internet auction fraud, 160
keylogger, 162
LRAT, 154
phishing, 156–158
plastic card fraud, 160
RBN, 20
SCADA system, 20
situational awareness
Church of Scientology, Anonymous attacks, 
112–113
EUs strategic initiatives, 116
financial motivations, 104
knowledge management, 102
Mafiaboy, 114–115, 118
moral motivations, 104–105
multiple motivations, 105
people layer knowledge, 102
political motivations, 104
promotional, 105
repository, 104
SEA (
see
Syrian Electronic Army (SEA))
self-actualization, 105
Stuxnet, 110–111, 117
UK banking sector, 112–113
UK strategy, 116
USA’s strategic initiatives, 115
spam mail, 158
traditional crime, 150
types, 19–21
UK law enforcement agencies, 153
virus, 161
Cyber-deceptions and thefts, 155
Cyber-enabled crime, 2–3
Cyber harassment/bullying, 159
Cyber Intelligence Sharing and Protection Act 2013 
(CISPA), 180
Cyber Investigators Staircase Model (CISM), 
34–35, 34
f
Cyber liability (CL) insurance
business interruption, 221–222
changing regulatory landscape, 226
command & control, 228
contingent business interruption, 222
cyber extortion, 227–228
cyber threat, 221, 225–226
extended business interruption, 222



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   273   274   275   276   277   278   279   280   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish