Spelling suggestions: "subject:"computer crimes"" "subject:"coomputer crimes""
111 |
Taxonomia de técnicas furtivas e antiforenses utilizadas em ataques cibernéticosMelo, Sandro Pereira de 19 March 2018 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-06-26T12:35:40Z
No. of bitstreams: 1
Sandro Pereira de Melo.pdf: 2533198 bytes, checksum: d31cf0cd607774a7541de96797446970 (MD5) / Made available in DSpace on 2018-06-26T12:35:40Z (GMT). No. of bitstreams: 1
Sandro Pereira de Melo.pdf: 2533198 bytes, checksum: d31cf0cd607774a7541de96797446970 (MD5)
Previous issue date: 2018-03-19 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / According to the current academic literature, numerous taxonomic
proposals for the classification of cyber threats have been presented. The vast
majority of these proposals focus on classifying the types of threats taking into
account aspects related to their functionality, purpose and behavior. This thesis
differs from others because it presents a taxonomic proposal to classify the Stealth
Technique (SF) and Anti-forensics (AF) used by cyber threats to hide information,
erase or cover up evidence, eliminate the track of the executed actions, obfuscate
malicious codes, generate fake evidence, subvert security controls and perform
attacks against their own forensic tools. Following the premise that a taxonomy must
be cohesive, of simple maintenance, applicable, extensible and must encompass
general types of SF and AF, the taxonomic proposal for classifying SF and AF
techniques mentioned in this thesis takes into account factors related to the affected
layer of a computer system, the moment of a cyber-attack using the techniques, the
component of the operational system compromised, among others. This thesis also
provides the following contributions: a brief index of threat indicators and their
impact on organizations using data from different sources, prioritizing the CSIRT
reports; some brief historical information of current SF and AF characteristics; an
explanation of the forensic investigation process and the SF and AT techniques
related to the affected forensic stage; and finally, the implementation of the
taxonomic proposal to classify the SF and AF techniques / De acordo com a literatura acadêmica atual, inúmeras propostas
taxonômicas de classificação de ameaças cibernéticas foram apresentadas. Em sua
maioria, tais propostas taxonômicas têm o foco na classificação dos tipos de
ameaças considerando aspectos relacionados ao funcionamento, finalidade e
comportamento. Esta tese difere das demais por apresentar uma proposta de
taxonomia para a classificação de Técnicas Furtivas (TF) e Antiforense (AF) utilizadas
pelas ameaças cibernéticas para esconder informações, apagar ou ocultar
evidências, eliminar a trilha das ações executadas, ofuscar códigos maliciosos, gerar
falsas evidências, subverter controles de segurança e realizar ataques contra as
próprias ferramentas forenses, impedindo e/ou prejudicando o processo de
resposta a incidentes ou uma perícia forense. Seguindo a premissa de que uma
taxonomia deve ser coesa, de simples manutenção, aplicável, extensível e deve
englobar tipos gerais de TF e AF, a taxonomia proposta na classificação de técnicas
TF e AF citada nesta tese leva em consideração fatores relacionados à camada
afetada de um sistema computacional, o desdobramento de um ataque cibernético
com o uso das técnicas, o componente do sistema operacional comprometido,
entre outros. Outras contribuições provenientes desta tese incluem: uma breve
sumarização de indicadores de ameaças e seus impactos em organizações a partir
de dados tabulados de diferentes tipos de pesquisa, mas priorizando os relatórios
de CSIRT, não exclusivamente; um sucinto histórico de informações sobre
características de TF e AF correntes; uma explanação atrelada às fases do processo
de perícia forense e das técnicas TF e AF relacionadas com a etapa forense afetada;
e finalmente, a implementação da taxonomia proposta para classificar as TF e AF
|
112 |
Nusikaltimų informatikai sampratos problema / The problem of the conception of crimes against informaticsSavickas, Mantas 18 December 2006 (has links)
Darbe nagrinėjama nusikaltimų informatikai samprata, jos esminiai požymiai, analizuojamos vyraujančios nusikaltimų informatikai sampratos teisinėje literatūroje. Taip pat nagrinėjami nusikaltimai, numatyti Lietuvos Respublikos baudžiamojo kodekso XXX skyriuje „Nusikaltimai informatikai“ nusikaltimų informatikai sampratos kontekste. Darbe autorius pateikia, jo požiūriu, priimtiniausią nusikaltimų informatikai sampratą ir nagrinėja šios sampratos galimą įtaką nusikaltimų informatikai reguliavimui Lietuvoje. Darbe analizuojami nusikaltimų informatikai požymiai, iš kurių didesnes diskusijas sukelia nusikaltimo informatikai objektas ir dalykas. Vieni autoriai teigia, kad nusikaltimų informatikai objektas yra santykiai, susiję su informacijos ir informacijos resursų saugiu kūrimu, naudojimu ir platinimu, kitų nuomone nusikaltimų informatikai objektas yra informacija. Tačiau darbe autorius nepritaria tokiam požiūriui ir mano, kad priimtiniausia nuomonė dėl nusikaltimo informatikai objekto, apibūdinanti kaip visuomeninius santykius, susijusius su kompiuterinės informacijos saugumu. Autorius pateikia nuomonę, kad nusikaltimų informatikai dalykas kompiuterinė informacija dėl savo savybės nekisti pakitus ją sudarantiems kompiuteriniams duomenims ne visuomet atspindi nusikaltimų informatikai esmę. Dėl to, manytina, kad nusikaltimų informatikai dalyku turėtų būti įvardinti kompiuteriniai duomenys. / The main topics were found out during this study are: the conception of crimes against
informatics, the main indications and analyzing of conception of crimes against informatics
according the law literature. The criminal activities named in Chapter XXX of Criminal Code of
the Republic of Lithuania are also described in this study. According the author point of view,
we proposes the most attractive conception of crimes against informatics and researching
possible influence on regulation of such crimes type in Republic of Lithuania of it.
In this study the author analyzed indications of crime against informatics. The main
causes of discussion are crime against informatics object and subject. There are different
opinions about it. One of these opinions suggests that the object of that kind of crime is
relationships, which are related to safe creation, use and broadcasting of information and
information resources. Another opinion – object is information. The author of this study is
disagree with such opinions and supposes that the most suitable opinion of conception of object
have to describe the social relationships, related to security of computer information. He thinks
that the subject of crime against informatics, computer information because of it feature to stay
unchangeable even if computer data has been changed, inadequate the crime substance. The
author suggests that the subject of crime against informatics is computer data.
The author analyzes different... [to full text]
|
113 |
Cyber-crime fear and victimizationAlshalan, Abdullah. January 2006 (has links)
Thesis (Ph.D.) -- Mississippi State University. Department of Sociology, Anthropology, and Social Work. / Title from title screen. Includes bibliographical references.
|
114 |
Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /Krutisch, Dorothee. January 2004 (has links) (PDF)
Univ., Diss.--Saarbrücken, 2003. / Literaturverz. S. 241 - 255.
|
115 |
www.crimesagainstchildren.com: addressing child pornography via the internet in AfricaAsubiaro, Omowumi Modupe January 2004 (has links)
Magister Legum - LLM / The study focus on child pornography on the Internet as a manifestation of sexual abuse and sexual exploitation of children. The debate centres around the exacerbated effect of child pornography on victims and subsequent effects on the society. Ultimately, the study aims to highlight the various legal and non-legal responses specific to child pornography on the Internet with a view to proffer solutions to African states on how to deal with the problem. The study also lend an African voice to the ongoing debate on how to deal with the problem of child pornography on the Internet. / South Africa
|
116 |
Incorporación de la modalidad del Phishing en la Ley de Delitos InformáticosCarrero Perez, Jhunior Stalyn January 2024 (has links)
La tipificación del phishing en la ley de delitos informáticos es de suma urgencia. Porque el nivel de incidencia de este delito a nivel nacional viene aumentando año con año. Sin embargo, la realidad nacional, el desconocimiento y el aumento de la tecnología vienen siendo los factores sociales que más afectan al aumento de esta clase de delitos. Ahora bien, la realidad social no puede ser ajena, debido al avance tecnológico que se está viviendo. En ese sentido, la presente investigación tiene como objetivo Proponer la tipificación de la modalidad del phishing en el artículo 8 de la ley de Delitos Informáticos. Se utilizó la metodología analítica, ya que esta ayudó a dar una solución a cada variable de nuestra problémica, sumado a ello se empleó legislación nacional y extranjera, y datos estadísticos. Como resultado de la investigación, divisamos que proponer la incorporación del phishing en la ley de delitos
informáticos es viable y necesario. / The criminalization of phishing in the law of computer crimes is of utmost urgency.
Because the level of incidence of this crime at the national level has been increasing year by year. However, the national reality, the lack of knowledge and the increase of technology are the social factors that most affect the increase of this kind of crime. However, the social reality cannot be ignored, due to the technological progress that is being experienced. In this sense, the objective of this research is to propose the typification of the phishing modality in article 8 of the Computer Crimes Law. The analytical methodology was used, since it helped to give a solution to each variable of our problem, in addition to this, national and foreign legislation and statistical data were used. As a result of the research, we concluded that proposing the incorporation of phishing in the computer crime law is feasible and necessary.
|
117 |
Barrera procesal en la persecución de delitos de chantaje sexual cometidos a través de las redes socialesRivas Machado, Rubi del Milagro January 2024 (has links)
En los últimos años, debido al incremento de la tecnología de la información y la comunicación se ha evidenciado por medio de una amplia investigación que han surgido nuevas modalidades denominados ciberdelitos, afectando directamente a la seguridad y tranquilidad de la población, pues como sucede en los casos de chantaje sexual, los delincuentes tienen una situación de ventaja frente a las víctimas, por lo que es imposible poder reconocer su identidad y mucho menos su ubicación. Sin embargo, no puede investigarse adecuadamente pues el Art. 230° del Código Procesal Penal, exige diversos presupuestos, siendo que, en los delitos de chantaje sexual, la pena no supera los cuatro años según lo estipulado en el Art. 176-C del Código Penal. Es por ello, que esta investigación tecnológica de tipo documental teórica o bibliográfica busca resolver problemas referidos a la impunidad en los delitos contra la libertad sexual en su modalidad de chantaje sexual, desarrollando entre los objetivos específicos, el análisis del Art. 230 del Código Procesal Penal para determinar la eficacia de la medida en la investigación y persecución de delitos de chantaje sexual tipo base, además de sustentar en el Derecho Nacional y comparado la modificación del Art. 230° del Código Procesal Penal en cuanto a las investigaciones fiscales en los delitos de chantaje sexual. / In recent years, due to the increase of information and communication technology, it has been evidenced through extensive research that new modalities called cybercrimes have emerged, directly affecting the security and tranquility of the population, because as in cases of sexual blackmail, criminals have an advantage over the victims, so it is impossible to recognize their identity, much less their location. However, it cannot be properly investigated because Art. 230° of the Criminal Procedural Code requires several assumptions, being that, in the crimes of sexual blackmail, the penalty does not exceed four years as established in Art. 176-C of the Criminal Code. Therefore, this technological research seeks to solve problems related to impunity in crimes against sexual freedom in its modality of sexual blackmail, through the analysis of Art. 230 of the Criminal Procedural Code to determine the effectiveness of the measure in the investigation and prosecution of base type sexual blackmail crimes, in addition to sustaining in national and comparative law the modification of Art. 230° of the Criminal Procedural Code regarding prosecutorial investigations in sexual blackmail crimes
|
118 |
Wetgewing teen elektroniese betredingUlrich, Neil. 11 1900 (has links)
Text in Afrikaans / Parralel met die snelle groei van rekenaartegnologie en die groteiwordende rol wat rekenaars in ans
alledaagse lewe speel, is daar ongelukkig 'n toename in die misbruik van rekenaars. Benewens die
wyses om rekenaarmisbruik by wyse van remedies in die siviele reg aan te spreek, is dit hoofsaaklik
die taak van die strafreg om sodanige misbruik te kriminaliseer en deur middel van straf sulke
misbruik te voorkom en oortreders af te skrik. Uit 'n ontleding van die Suid-Afrikaanse strafreg het dit
geblyk dat bestaande misdrywe, beide gemeenregtelik en statuter, nie voldoende rekenaarmisbruik
kan kriminaliseer en aanspreek nie. Wetgewing blyk die mees gepaste optossing te wees. Uit 'n
regsvergelykende studie van die hantering van rekenaarmisbruik in jurisdiksies waar die wetgewer
verskillende benaderings toegepas het, het dit geblyk dat die mees gepaste wyse om
rekenaarmisbruik te kriminaliseer sal wees om ongemagtigde rekenaarbetreding as moedermisdaad
te bestraf aangesien dit die fondament is waarop enige verdere misbruik van 'n rekenaar gebaseer
word. Daarbenewens moet verdere meer spesifieke misbruikshandelinge wyd omskryfword as
misdrywe, ten opsigte van meer emstige misbruik na betreding van 'n rekenaar / Parallel with the growth in computer technology and increasing use of computers, there has been
an increase in computer misuse. In addition to addressing different methods of computer misuse in
terms of civil law remedies, it is mainly the task of the criminal law to criminalise such misuse, prevent
computer misuse and deter offenders by means of punishment. It was clear from a study of South
African criminal law that existing offences, both statutory and in terms of the common law, do not
criminalise and address computer misuse effectively. It therefore seems that legislation would be the
most appropriate solution. It appeared from a comparative study of jurisdictions where legislators
approach computer misuse differently, that the most effective way of criminalising computer misuse
would be to criminalise una1,1thorised computer accessing as basic offence. In addition thereto more
specific further acts of serious computer misuse, defined broadly, should be criminalised / Criminal & Procedural Law / LL.M. (Criminal & Procedural Law)
|
119 |
www.crimesagainstchildren.com: addressing child pornography via the internet in AfricaAsubiaro, Omowumi Modupe January 2004 (has links)
The study focus on child pornography on the Internet as a manifestation of sexual abuse and sexual exploitation of children. The debate centres around the exacerbated effect of child pornography on victims and subsequent effects on the society. Ultimately, the study aims to highlight the various legal and non-legal responses specific to child pornography on the Internet with a view to proffer solutions to African states on how to deal with the problem. The study also lend an African voice to the ongoing debate on how to deal with the problem of child pornography on the Internet
|
120 |
Aspectos processuais e penais dos crimes de computadorTorre, Marina Giantomassi Della 06 May 2009 (has links)
Made available in DSpace on 2016-04-26T20:29:02Z (GMT). No. of bitstreams: 1
Marina Giantomassi Della Torre.pdf: 490215 bytes, checksum: c01546dbd7fe68ae1b0015e00df366c6 (MD5)
Previous issue date: 2009-05-06 / We live in the midst of a technological revolution. In the wake of
innovation, a traditional and conservative judicial order faces, simultaneously, an old
and new reality. While the old reality is based on concepts and habits either built or
resulting from facts and activities that can be perceived and identified; the new reality
is based on a virtual mean, where new relationships arise (not necessarily connected to
the real world), requiring new concepts and interpretations.
The use of telematics leads to a considerable change in the habits of those
who make use of it, enabling their definitive inclusion in an increasingly dynamic
world.
The emergence of telematics poses many challenges in the Law field.
Among the main ones, we highlight the need to establish regulation for criminal
conducts carried out in this mean. Given its characteristics, it requires the establishment
of a paradigm for preventive control, in addition to severe repressive means.
Using the relationships between Brazilian law, comparative law, discussions
of doctrine and jurisprudence and proposals of this new scenario, we seek to analyze a
set of questions, including juridical goods affected by telematics crimes; supposed
criminals and their victims; and problems related to their types and competencies.
The identification of authors and relative relevancies are also needed for this
new and complex fashion of crimes: technology crimes resulting from a new global and
risky information society.
Lastly, seeking to protect the principles of the Federal Constitution, both the
citizen and State s fundamental rights and guarantees must be secured, reinforcing the
base of the Democratic State of law. This must be done through a judgment
consideration that observes the proportionality principle, in every single situation that
requires investigation and punishment of crimes of this nature / Vivemos uma revolução no âmbito da tecnologia. Neste despertar de
inovações, uma ordem jurídica tradicional e conservadora, baseada em relações e
conceitos historicamente construídos e derivados de usos e costumes fundamentalmente
dependentes de fatos e atividades perceptíveis e identificáveis, depara-se com uma
velha e uma nova realidade, pela qual surgem novas relações, totalmente diversas
do mundo real, e que exigem novos conceitos e interpretações.
A existência da telemática mostra-se como uma considerável mudança nos
hábitos cotidianos daqueles que a utilizam, promovendo sua inclusão definitiva em um
mundo cada vez mais dinâmico.
No campo do Direito, o seu surgimento propõe vários desafios, entre os
quais o mais manifesto é a necessidade de se criar mecanismos reguladores para as
condutas criminosas desenvolvidas nesse meio, que impõe, pelas suas características,
além de paradigma de controle repressivo mais severo, um paradigma preventivo em
nossa legislação.
Utilizando de uma relação entre a lei brasileira, o direito comparado, as
discussões doutrinárias e jurisprudenciais e propostas dessa nova conjuntura,
procuramos analisar uma série de questões, dentre elas os bens jurídicos atingidos pela
criminalidade informática, o pretensos criminosos e suas vítimas, problemas acerca da
tipicidade e competência.
Mostra-se necessária, também, a identificação de autoria e materialidade
relativas a essa nova e complexa modalidade de ilícitos: a criminalidade informática,
surgida em uma sociedade global de risco informático e da informação.
Por fim, com o objetivo de resguardar os princípios trazidos pela
Constituição Federal, tanto os direitos e garantias fundamentais do cidadão quanto os
direitos e garantias do Estado, devem ser assegurados, reforçando-se as bases de um
Estado Democrático de Direito, por meio de um juízo de ponderação que observe o
princípio da proporcionalidade, toda vez que se fizer necessária a apuração e punição da
prática de crimes dessa natureza
|
Page generated in 0.0854 seconds