Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet281/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   275   276   277   278   279   280   281   282   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

281
 
Index
Natural Language Processing (NLP) technique, 
206–207
Near Field Communication (NFC), 25
Network Attached Storage (NAS ), 131
Network Traffic Data Warehouse, 251
Nugache botnets, 243
O
Obscene Publications Act 1959 & 1964, 91
On Demand Multicast Routing Protocol (ODMRP), 
271
Onion router, 130
Operation High Roller, 111, 117
OpIsrael, 167
Organization for Economic Co-operation and 
Development (OECD), 136
P
Packet Data Optimized (PDO), 260
Passive personality theory, 3–4
Pay-Per-Install (PPI) service, 238
Pay-per-use (PPU) model, 237–238
Peer-to-Peer (P2P) network, 241
Personal computer (PC), 22
Phishing, 156–158
Piracy, 72
Police and Criminal Evidence Act (PACE), 99
Police investigation
contact management, 38–39
crime and terror, 39–41
decision making processes, 32–34
hypothesis, 36–37
innovative approaches, 37–38
problem solving
CISM, 34–35, 34
f
SARA model, 35–36, 36
f
Police National Legal Database (PNLD), 2
Police Reform and Social Responsibility Act 2011, 
7
PPDR. 
See
Public Protection and Disaster Relief 
(PPDR)
PredPol software, 182
Professional indemnity (PI) insurance, 222
Professional Mobile Radio (PMR). 
See
Public 
Protection and Disaster Relief (PPDR)
Programmable Logic Controller (PLC), 23
Project Chanology, 113
Project Rivolta, 114
Proposal for a Directive in the law enforcement 
sector (PDPI), 186
Proposal for a new General Data Protection 
Regulation, 186, 188
Proposal for a new General Data Protection 
Regulation (PGDPR), 186
Protecting Children From Internet Pornographers 
Act 2011, 180
Protection from Harassment Act 1997, 92
Protection of Children Act 1978, 91
Protective theory, 4
Proxy relay services, 73–74
Public Order Act 1986, 91
Public Protection and Disaster Relief (PPDR)
advantages, 267
Air Interface (AIR IF), 260–261
air-interface security, 269–270
communication network architecture landscape, 
263–265
current trends, 261–262
Direct Mode Operation (DMO), 260–261
disasters, 259–260, 272
DVB-T/DTTV NETWORK, 271–272
end-to-end security, 269–270
ETSI, 260
GSM, 266
Inter-System Interface (ISI), 260–261
MIPGATE, 267–269
mobile ad-hoc network, 270–271
PDO systems, 260
PMR, 265
re-engineer commercial networks, 262
security and safety threats, 259–260
Terminal Equipment Interface (TEI), 260–261
TETRAPOL, 265–266
transmission control protocol (TCP), 269

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   275   276   277   278   279   280   281   282   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish