Cyber Crime and Cyber Terrorism


R Regulation of Investigatory Powers Act 2000,  76–77 Russian Business Network (RBN), 20 S



Download 5,67 Mb.
Pdf ko'rish
bet282/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   275   276   277   278   279   280   281   282   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

R
Regulation of Investigatory Powers Act 2000, 
76–77
Russian Business Network (RBN), 20
S
Scanning, Analysis, Response and Assessment 
(SARA) model, 35–36, 36
f
SEA. 
See
Syrian Electronic Army (SEA)
Senior Investigating Officers (SIO), 32
Sentiment analysis technique, 206–207
Sharia law, 124
Skype v3 messages, 80
Social media
and Big Data
computer resources, 176
crime prevention data collection, 182
data and data sharing, 177
esurveillance legislation, 179–181


282
Index
Social media
 (Continued)
E.U. reform, 184–186
European data protection framework,
186–189
legitimacy, 182–183
private sector tools and resources, 183
public and the private, social control,
178–183
LEA (
see
Law enforcement agency (LEA), social 
media)
Steganography, 126
Strategic Policing Requirement (SPR), 7–8
Stuxnet, 20–21, 110–111, 117
Supervisory Control And Data Acquisition 
(SCADA), 23
Symantec Intelligence Report (2013), 158
Syrian Electronic Army (SEA), 167
amateur geo-Politian’s, 106
AngryBirds, attack on, 108–109
CNN, attack on, 108
DDoS/DoS, 107
Melbourne IT, 108
Microsoft, attack on, 109
phishing, 107, 117
political/moral hackers, 106–107, 117
pro-regime hacker group, 106
Saudi Arabian government website, 109
social media presence, 109–110
website and online profiles, 106
System volume information folders, 87–88
T
Tamil Tigers guerilla fighters, 166–167
Tel Aviv Stock Exchange website, 166–167
Telecommunications Act 1984, 91
Terrestrial Trunked Radio (TETRA). 
See
Public 
Protection and Disaster Relief (PPDR)
Territoriality theory, 3
Terrorist Finance Tracking System (EU TFTS), 
128–130
Theft Act 1968 & 1978, 91
The onion router (TOR) Hidden Services, 130
Third-party cyber liability, 224
Tor algorithm, 73–74
Total Information Awareness (TIA), 179
Trafficking in Human Beings (THB), 211–213
Transmission control protocol (TCP), 269
TrueCrypt, 126
Tsouli, Younes, 39, 40–41
U
UK banks, 112–113
UK Cyber Security Strategy, 1
United Nations Conventions on the Rights of the 
Child (UNCRC), 134
Universality theory, 4
UN Protocol on Trafficking, 137

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   275   276   277   278   279   280   281   282   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish