Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet34/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   30   31   32   33   34   35   36   37   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

CHAPTER
31
4
Police investigation 
processes: practical 
tools and techniques for 
tackling cyber crimes
Andrew Staniforth
INTRODUCTION
The Internet has brought, and will continue to bring, huge benefits to industry, in-
dividual citizens and their communities around the world. Unfortunately, there are 
a small but increasing minority of people who seek to exploit new opportunities for 
their chosen criminal purpose. Cyber criminals are quick to spot the potential vul-
nerabilities of new technologies and use them to commit offences, or try to frustrate 
detection of their activities (HM 
Government, 2011
). Cyber crime and cyber terror-
ism is no longer about those who simply seek to access computer systems to prove it 
can be done. Cyber threats are real and damaging. The criminals and terrorists behind 
contemporary cyber threats to society are well organized, and seek to take advantage 
of those using Internet services. Whether this is for financial gain, in pursuance of 
extremist ideologies or as threats to children, the impact on the victims can be dev-
astating. The most vulnerable members of our society are all too often the victims 
of cyber crimes—from young people threatened by bullying or sexual predators, to 
the elderly who provide easy prey for organized fraudsters (HM 
Government, 2010
).
To tackle the phenomenon of cyber crime and cyber terrorism, governments 
across the world have invested substantial resources in homeland security, resulting 
in significant law enforcement and intelligence agency responses to online threats. 
Designed to detect, deter and disrupt all manner of cyber-related hazards, new cyber 
policing units have been rapidly established to investigate cyber crimes (
Awan and 
Blakemore, 2012
). Such investment fulfils the first duty of governments to protect 
the security and safety of their country, citizens and their wider interests. The focus 
and investments made to tackle cyber crime and cyber terrorism are welcomed but no 
one in authority can afford to be complacent. The threat from cyber crime and cyber 
terrorism is constantly evolving—with new opportunities to commit “old” crimes 
in new ways as well as high-tech crimes which did not exist several years ago (HM 
Government, 2011
). Cyber criminals are becoming more sophisticated, and they 
continue to develop malicious software and devise improved methods for infecting 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   30   31   32   33   34   35   36   37   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish