Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet46/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   42   43   44   45   46   47   48   49   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

42
CHAPTER 4
Police investigation processes
contemporary cyber investigations rely upon a collaborative, multi-disciplinary and 
multi-agency approach where police detectives, hi-tech investigators, forensic ana-
lysts and experts from academia and the private sector work together to tackle cyber 
threats. The complex nature and sophistication of cyber crime and cyber terrorism 
continues to demand a dedicated and determined response, especially from investiga-
tors who are critical to the success of tracking cyber criminals and bringing them to 
justice. A professionally trained, highly skilled cyber investigative workforce is now 
required. This workforce must prepare and equip itself for the cyber challenges that 
lie ahead and the reading of the chapters which follow provide an excellent starting 
point. Most importantly however, cyber crime and cyber terrorism investigators—no 
matter how complex and technical cyber investigations become in the future—must 
develop their expertise founded upon the core investigative competencies outlined in 
this chapter.
REFERENCES
Awan, I., Blakemore, B., 2013. Policing Cyber Hate, Cyber Threats and Cyber Terrorism. 
Ashgate Publishing Ltd, Surrey.
Caless, B., Harfield, C., Spruce, B., 2012. Blackstone’s Police Operational Handbook: Practice 
and Procedure, second ed. Oxford University Press, Oxford.
Cook, T., Tattersall, A., 2010. Blackstone’s Senior Investigating Officers’ Handbook, second ed. 
Oxford University Press, Oxford.
Government, H.M., 2010. A Strong Britain in an Age of Uncertainty: The National Security 
Strategy, London Stationary Office, London.
Government, H.M., 2011. The UK Cyber Security Strategy—Protecting and Promoting the 
UK in a Digital Age, London Stationary Office, London.
Staniforth, A., 2014. Preventing Terrorism and Violent Extremism. Oxford University Press, 
Oxford.
Staniforth, A., PNLD, 2013. Blackstone’s Counter-Terrorism Handbook, third ed. Oxford 
University Press, Oxford.
Staniforth, A., PNLD, 2009. Blackstone’s Counter-Terrorism Handbook. Oxford University 
Press, Oxford.
Staniforth, A., 2012. The Routledge Companion to UK Counter-Terrorism. Routledge, Oxford.
Wall, D., 2007. Cybercrime—The Transformation of Crime in the Information Age. Polity 
Press, Cambridge.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   42   43   44   45   46   47   48   49   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish