Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet96/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   92   93   94   95   96   97   98   99   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

89
 
References
Nelson, B., Phillips, A., Steuart, C., 2010. Guide To Computer Forensics and Investigations, 
fourth ed. Cengage Learning, Boston.
Olson, P., 2012. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and 
the Global Cyber Insurgency. Little, Brown and Company, Boston.
Tor, 2014. Tor. [Online] Available at: 
https://www.torproject.org/
 (accessed 23.02.14).
TrueCrypt, 2014. TrueCrypt. [Online] Available at: 
http://www.truecrypt.org/
(accessed 2014 
February 2014).
Wade, M., 2011. DFI News. [Online] Available at: 
http://www.dfinews.com/articles/2011/06/ 
memory-forensics-where-start
 (accessed 22.02.14).


CHAPTER
91
8
Digital forensics education
training and awareness
Hamid Jahankhani, Amin Hosseinian-far
INTRODUCTION
In a fully connected truly globalized world of networks, most notably the internet, 
mobile technologies, distributed databases, electronic commerce and e-governance 
e-crime manifests itself as Money Laundering; Intellectual Property Theft; Identity 
Fraud/Theft; Unauthorized access to confidential information; Destruction of infor-
mation; Exposure to Obscene Material; Spoofing and Phishing; Viruses and Worms 
and Cyber-stalking, Economic Espionage to name a few.
According to the House of Commons, Home Affairs Committee, Fifth Report of 
Session 2013–14, on E-Crime, “Norton has calculated its global cost to be $388bn 
dollars a year in terms of financial losses and time lost. This is significantly more 
than the combined annual value of $288bn of the global black market trade in heroin, 
cocaine and marijuana” (
E-crime, House of Commons, 2013
).
Since the launch of the UK’s first Cyber Security Strategy in June 2009 and the 
National Cyber Security Programme (NCSP) in November 2011, UK governments 
have had a centralized approach to cybercrime and wider cyber threats.
Until recently E-crimes had to be dealt with under legal provisions meant for 
old crimes such as conspiracy to commit fraud, theft, harassment, and identity theft. 
Matters changed slightly in 1990 when the Computer Misuse Act was passed but 
even then it was far from sufficient and mainly covered crimes involving hacking.
There were no new laws specific to computer crime since the Computer Misuse 
Act 1990, until The Fraud Act of 2006 to deal with e-crimes. The laws relied upon 
are as follows:
• Theft Act 1968 & 1978, (Amendment) 1996
• Criminal Attempts Act 1981
• Telecommunications Act 1984
• Public Order Act 1986
• Protection of Children Act 1978
• Obscene Publications Act 1959 & 1964
• Data Protection Act 1998
• Human Rights Act 1998
• Defamation Act 1952 & 1996



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   92   93   94   95   96   97   98   99   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish