275
Index
A
Active personality theory, 3
Al-Qaeda type terror groups, 126, 127
Amerithrax, 125–126
Amn al-Mujahid, 127
Ansar al Mujahideen, 124
Anti-forensics, 79
digital tools and approaches, 94–96
traditional forensics, 94
Asrar al-Dardashah, 127
Association of Chief Police Officers (ACPO), 75, 97
B
Balkan Investigative Reporting Network (BIRN),
213
Basic Input Output System (BIOS), 81
BIOS parameter block (BPB), 82
Blackhole exploit kit, 235, 236
f
Botnets, 161
advantages, 255
Agobot, 232
Blackhole exploit kit, 235, 236
f
Conficker, 232
criminal business model, 237, 237
f
DDOS, 250, 251–252
definition, 231
diffusion, 231
DNS features, 253, 253
f
Eurograbber (
see
Eurograbber attack)
hidden services, 254, 255
f
hunting methods, 250
money flows, 238, 239
f
network topologies and protocols
C&C server, 240
centralized architecture, 241, 241
f
Command & Control (C&C) server, 240, 241
DGA, 243
IRC bot, 243
Nugache, 243
P2P network, 241, 242
f
Network Traffic Data Warehouse, 251
pillars, 253, 254
f
Porters model, 238
PPI, 238
PPU, 237–238
primary activities, 239, 240
f
protocols failure messages, 252, 252
f
SDBot, 232
TOR, 254
Watering Hole attack, 236
ZeroAccess, 247–249, 248
f
zero-day exploit, 236
Zeus platform, 233
British Psychological Society (BPS), 48
Budapest Convention, 8–9, 153
Business interruption insurance, 221–222
C
Calce, Michael, 114–115
Card-not-present (CNP) fraud, 160
Centralized Cross-Border Child Traffic (CBCT),
141, 142–145, 145
f
Centre for Information Technology Research for the
Interest of Society (CITRIS), 100
Child protection, ICT
child-centered actions and information flows,
139–142, 140
f
cyber bullying, 133
Deep Web, 134
global digital network safety, 133
government responsibilities, 136
information awareness and education,
135–136
legal and policy framework, 134, 136
MCA program (
see
Missing Child Alert (MCA)
program)
on-line pornography, 133
technical challenges, 134
United Nations Conventions on the Rights of the
Child, 134–135
Child trafficking
anti-trafficking initiatives, 137
CBCT response system, 141, 142–145, 145
f
cross-border child trafficking, 137
definition
SAARC Trafficking Convention, 138
UN Protocol on Trafficking, 137
labor/sexual exploitation, 137
poverty, 137
push and pull factors, 137
Church of Scientology, 113–114
CL insurance.
See
Cyber liability (CL) insurance
Closed circuit television (CCTV) system, 45
Command & Control (C&C) server, 240
Note: Page numbers followed by
f
indicate figures and
t
indicate tables.
276
Index
Communications Assistance For Law Enforcement
Act (CALEA), 180
Communications Capabilities Development
Programme (CCDP), 180–181
Computer forensics
anti-forensics
digital anti-forensics tools and approaches,
94–96
traditional forensics, 94
CFM, phases, 99
computer tools and services, 93
defense lawyers, 100
digital evidence, 92
e-crimes
ACPO guidelines, 92
Fraud Act 2006, 91, 92
global cost, 91
manifestations, 91
education and training, 97–99
forensics laboratory preparation and training,
93–94
law enforcement officers, 96–97
multi-disciplinary research centers, 100
physical evidence, 92
Computer Fraud and Abuse Act, 20
Computer Misuse Act 1990, 1, 2, 91
Conficker, 232
Contingent business interruption (CBI), 222
Council of Europe Convention on Cybercrime, 1
Creeper virus, 20
Criminal Attempts Act 1981, 91, 92
Criminal business model, 237, 237
f
Criminology, 152
Crowd-sourcing data, 209–211
Cryptocurrency, 128
Cyber bullying, 133
Cyber constables, 9
Cybercrime
botnets, 161
Budapest Convention, 153
classifications and types
active crime, 154
computer’s relationship, 154
cyber-deceptions and thefts, 155
cyber-pornography, 155
cyber-trespass, 155
passive computer crime, 154
technical and societal perspective, 155
violent impact, 155
Creeper virus, 20
criminology, 152
definition, 102, 149
EDT, 20
e-mails, 161
hacking, 158–159
harassment/bullying, 159
high-tech investigations (
see
High-tech
investigations)
identity theft, 159–160
impact, 150, 151
t
internet auction fraud, 160
keylogger, 162
LRAT, 154
phishing, 156–158
plastic card fraud, 160
RBN, 20
SCADA system, 20
situational awareness
Church of Scientology, Anonymous attacks,
112–113
EUs strategic initiatives, 116
financial motivations, 104
knowledge management, 102
Mafiaboy, 114–115, 118
moral motivations, 104–105
multiple motivations, 105
people layer knowledge, 102
political motivations, 104
promotional, 105
repository, 104
SEA (
see
Syrian Electronic Army (SEA))
self-actualization, 105
Stuxnet, 110–111, 117
UK banking sector, 112–113
UK strategy, 116
USA’s strategic initiatives, 115
spam mail, 158
traditional crime, 150
types, 19–21
UK law enforcement agencies, 153
virus, 161
Cyber-deceptions and thefts, 155
Cyber-enabled crime, 2–3
Cyber harassment/bullying, 159
Cyber Intelligence Sharing and Protection Act 2013
(CISPA), 180
Cyber Investigators Staircase Model (CISM),
34–35, 34
f
Cyber liability (CL) insurance
business interruption, 221–222
changing regulatory landscape, 226
command & control, 228
contingent business interruption, 222
cyber extortion, 227–228
cyber threat, 221, 225–226
extended business interruption, 222
Do'stlaringiz bilan baham: |