279
Index
G
Global Islamic Media Front, 127
Globally unique identifier (GUID) addressing
scheme, 81
Global system for mobile communication
(GSM), 266
H
High-tech investigations
components, 60–61
core evidence
deleted files, 68
file slack, 67–68
temporary files, 68
crime scene, 61–64
data analysis, 64–67
data verification, 64
digital information, 59
digital landscapes, 61
evidence filtering, 66
forensics, 59–60
index search, 67
live and online data capture, 62–63
offline (dead) data capture, 63–64
real-time search, 67
regular expressions, 67
requirements, 64
restore points, 69
signature analysis, 66
Windows event logs, 69
Windows LNK files, 68
Windows Prefetch files, 68
Windows registry, 69
Human Rights Act 1998, 91
I
Identity theft, 159–160
Indemnification, 224
Information and communication technology
(ICT), 12
child protection
child-centered actions and information flows,
139–142, 140
f
cyber bullying, 133
Deep Web, 134
government responsibilities, 136
information awareness and education, 135–136
legal and policy framework, 134, 136
MCA program (
see
Missing Child Alert
(MCA) program)
on-line pornography, 133
safety on global digital network, 133
technical challenges, 134
United Nations Conventions on the Rights of
the Child, 134–135
cyber security
Apple II, 22
computer access, 21
digital red light/speed trap camera, 26
energy and drinking water sectors, 26–27
financial sector, 25
health sector, 25, 27–28
innovation areas, 24
Internet of Things (IOT), 28
modern living, 24–25
one-way encryption process, 21–22
organizational aspects, 23–24
PCs, 22
PLC boards, 23
SCADA protocols, 23
smart appliances, 27
smart meters, 26–27
transport sector, 25–26
unauthorized way, 24
user-friendly functionality, 21
wireless encryption protocol (WEP), 22
mobile communication technologies, 133
privacy and private information, 133
Injured forum theory, 4
International Association of Chiefs of Police
(IACP), 199
International Centre for Missing & Exploited
Children (ICMEC), 138
International Covenant on Civil and Political
Rights, 3
Internet
children, 133
Deep Web, 134
government responsibilities and legal
framework, 135–136
information awareness and education, 135–136
on-line pornography, 133
terrorist organizations
Al-Qaeda type groups, 126–127
cyber terrorism, 127–128
darknet networks, 130
3D printing, 130
financing, 128–130
Jihadi cause, 123–124
Lone Wolves, 125–126
online social network services, 124–125
propaganda purposes, 123
radicalization process, 125
terrorist forum, 124
VPN service, 131
280
Index
Internet auction fraud, 160
Internet Black Tigers, 166–167
Internet Games-based electronic money, 128
Internet of Things (IOT), 28
Internet Protocol (IP) address, 72–73
anonymizing proxy relay services, 73–74
Firewall and system logs, 74
IDS, network traffic, 74
spoofing, 73
Internet Relay Chat (IRC), 73–74
Intrusion Detection Systems (IDS), 74
Irhabi 007, 39
Israeli-Palestinian conflict, 167
Izz ad-Din al-Qassam Cyber Fighters, 168
Do'stlaringiz bilan baham: |