• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 117
  • 8
  • 5
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 162
  • 162
  • 53
  • 39
  • 36
  • 36
  • 34
  • 34
  • 31
  • 30
  • 29
  • 29
  • 29
  • 27
  • 25
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Taxonomia de técnicas furtivas e antiforenses utilizadas em ataques cibernéticos

Melo, Sandro Pereira de 19 March 2018 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-06-26T12:35:40Z No. of bitstreams: 1 Sandro Pereira de Melo.pdf: 2533198 bytes, checksum: d31cf0cd607774a7541de96797446970 (MD5) / Made available in DSpace on 2018-06-26T12:35:40Z (GMT). No. of bitstreams: 1 Sandro Pereira de Melo.pdf: 2533198 bytes, checksum: d31cf0cd607774a7541de96797446970 (MD5) Previous issue date: 2018-03-19 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / According to the current academic literature, numerous taxonomic proposals for the classification of cyber threats have been presented. The vast majority of these proposals focus on classifying the types of threats taking into account aspects related to their functionality, purpose and behavior. This thesis differs from others because it presents a taxonomic proposal to classify the Stealth Technique (SF) and Anti-forensics (AF) used by cyber threats to hide information, erase or cover up evidence, eliminate the track of the executed actions, obfuscate malicious codes, generate fake evidence, subvert security controls and perform attacks against their own forensic tools. Following the premise that a taxonomy must be cohesive, of simple maintenance, applicable, extensible and must encompass general types of SF and AF, the taxonomic proposal for classifying SF and AF techniques mentioned in this thesis takes into account factors related to the affected layer of a computer system, the moment of a cyber-attack using the techniques, the component of the operational system compromised, among others. This thesis also provides the following contributions: a brief index of threat indicators and their impact on organizations using data from different sources, prioritizing the CSIRT reports; some brief historical information of current SF and AF characteristics; an explanation of the forensic investigation process and the SF and AT techniques related to the affected forensic stage; and finally, the implementation of the taxonomic proposal to classify the SF and AF techniques / De acordo com a literatura acadêmica atual, inúmeras propostas taxonômicas de classificação de ameaças cibernéticas foram apresentadas. Em sua maioria, tais propostas taxonômicas têm o foco na classificação dos tipos de ameaças considerando aspectos relacionados ao funcionamento, finalidade e comportamento. Esta tese difere das demais por apresentar uma proposta de taxonomia para a classificação de Técnicas Furtivas (TF) e Antiforense (AF) utilizadas pelas ameaças cibernéticas para esconder informações, apagar ou ocultar evidências, eliminar a trilha das ações executadas, ofuscar códigos maliciosos, gerar falsas evidências, subverter controles de segurança e realizar ataques contra as próprias ferramentas forenses, impedindo e/ou prejudicando o processo de resposta a incidentes ou uma perícia forense. Seguindo a premissa de que uma taxonomia deve ser coesa, de simples manutenção, aplicável, extensível e deve englobar tipos gerais de TF e AF, a taxonomia proposta na classificação de técnicas TF e AF citada nesta tese leva em consideração fatores relacionados à camada afetada de um sistema computacional, o desdobramento de um ataque cibernético com o uso das técnicas, o componente do sistema operacional comprometido, entre outros. Outras contribuições provenientes desta tese incluem: uma breve sumarização de indicadores de ameaças e seus impactos em organizações a partir de dados tabulados de diferentes tipos de pesquisa, mas priorizando os relatórios de CSIRT, não exclusivamente; um sucinto histórico de informações sobre características de TF e AF correntes; uma explanação atrelada às fases do processo de perícia forense e das técnicas TF e AF relacionadas com a etapa forense afetada; e finalmente, a implementação da taxonomia proposta para classificar as TF e AF
112

Nusikaltimų informatikai sampratos problema / The problem of the conception of crimes against informatics

Savickas, Mantas 18 December 2006 (has links)
Darbe nagrinėjama nusikaltimų informatikai samprata, jos esminiai požymiai, analizuojamos vyraujančios nusikaltimų informatikai sampratos teisinėje literatūroje. Taip pat nagrinėjami nusikaltimai, numatyti Lietuvos Respublikos baudžiamojo kodekso XXX skyriuje „Nusikaltimai informatikai“ nusikaltimų informatikai sampratos kontekste. Darbe autorius pateikia, jo požiūriu, priimtiniausią nusikaltimų informatikai sampratą ir nagrinėja šios sampratos galimą įtaką nusikaltimų informatikai reguliavimui Lietuvoje. Darbe analizuojami nusikaltimų informatikai požymiai, iš kurių didesnes diskusijas sukelia nusikaltimo informatikai objektas ir dalykas. Vieni autoriai teigia, kad nusikaltimų informatikai objektas yra santykiai, susiję su informacijos ir informacijos resursų saugiu kūrimu, naudojimu ir platinimu, kitų nuomone nusikaltimų informatikai objektas yra informacija. Tačiau darbe autorius nepritaria tokiam požiūriui ir mano, kad priimtiniausia nuomonė dėl nusikaltimo informatikai objekto, apibūdinanti kaip visuomeninius santykius, susijusius su kompiuterinės informacijos saugumu. Autorius pateikia nuomonę, kad nusikaltimų informatikai dalykas kompiuterinė informacija dėl savo savybės nekisti pakitus ją sudarantiems kompiuteriniams duomenims ne visuomet atspindi nusikaltimų informatikai esmę. Dėl to, manytina, kad nusikaltimų informatikai dalyku turėtų būti įvardinti kompiuteriniai duomenys. / The main topics were found out during this study are: the conception of crimes against informatics, the main indications and analyzing of conception of crimes against informatics according the law literature. The criminal activities named in Chapter XXX of Criminal Code of the Republic of Lithuania are also described in this study. According the author point of view, we proposes the most attractive conception of crimes against informatics and researching possible influence on regulation of such crimes type in Republic of Lithuania of it. In this study the author analyzed indications of crime against informatics. The main causes of discussion are crime against informatics object and subject. There are different opinions about it. One of these opinions suggests that the object of that kind of crime is relationships, which are related to safe creation, use and broadcasting of information and information resources. Another opinion – object is information. The author of this study is disagree with such opinions and supposes that the most suitable opinion of conception of object have to describe the social relationships, related to security of computer information. He thinks that the subject of crime against informatics, computer information because of it feature to stay unchangeable even if computer data has been changed, inadequate the crime substance. The author suggests that the subject of crime against informatics is computer data. The author analyzes different... [to full text]
113

Cyber-crime fear and victimization

Alshalan, Abdullah. January 2006 (has links)
Thesis (Ph.D.) -- Mississippi State University. Department of Sociology, Anthropology, and Social Work. / Title from title screen. Includes bibliographical references.
114

Strafbarkeit des unberechtigten Zugangs zu Computerdaten und -systemen /

Krutisch, Dorothee. January 2004 (has links) (PDF)
Univ., Diss.--Saarbrücken, 2003. / Literaturverz. S. 241 - 255.
115

www.crimesagainstchildren.com: addressing child pornography via the internet in Africa

Asubiaro, Omowumi Modupe January 2004 (has links)
Magister Legum - LLM / The study focus on child pornography on the Internet as a manifestation of sexual abuse and sexual exploitation of children. The debate centres around the exacerbated effect of child pornography on victims and subsequent effects on the society. Ultimately, the study aims to highlight the various legal and non-legal responses specific to child pornography on the Internet with a view to proffer solutions to African states on how to deal with the problem. The study also lend an African voice to the ongoing debate on how to deal with the problem of child pornography on the Internet. / South Africa
116

Incorporación de la modalidad del Phishing en la Ley de Delitos Informáticos

Carrero Perez, Jhunior Stalyn January 2024 (has links)
La tipificación del phishing en la ley de delitos informáticos es de suma urgencia. Porque el nivel de incidencia de este delito a nivel nacional viene aumentando año con año. Sin embargo, la realidad nacional, el desconocimiento y el aumento de la tecnología vienen siendo los factores sociales que más afectan al aumento de esta clase de delitos. Ahora bien, la realidad social no puede ser ajena, debido al avance tecnológico que se está viviendo. En ese sentido, la presente investigación tiene como objetivo Proponer la tipificación de la modalidad del phishing en el artículo 8 de la ley de Delitos Informáticos. Se utilizó la metodología analítica, ya que esta ayudó a dar una solución a cada variable de nuestra problémica, sumado a ello se empleó legislación nacional y extranjera, y datos estadísticos. Como resultado de la investigación, divisamos que proponer la incorporación del phishing en la ley de delitos informáticos es viable y necesario. / The criminalization of phishing in the law of computer crimes is of utmost urgency. Because the level of incidence of this crime at the national level has been increasing year by year. However, the national reality, the lack of knowledge and the increase of technology are the social factors that most affect the increase of this kind of crime. However, the social reality cannot be ignored, due to the technological progress that is being experienced. In this sense, the objective of this research is to propose the typification of the phishing modality in article 8 of the Computer Crimes Law. The analytical methodology was used, since it helped to give a solution to each variable of our problem, in addition to this, national and foreign legislation and statistical data were used. As a result of the research, we concluded that proposing the incorporation of phishing in the computer crime law is feasible and necessary.
117

Barrera procesal en la persecución de delitos de chantaje sexual cometidos a través de las redes sociales

Rivas Machado, Rubi del Milagro January 2024 (has links)
En los últimos años, debido al incremento de la tecnología de la información y la comunicación se ha evidenciado por medio de una amplia investigación que han surgido nuevas modalidades denominados ciberdelitos, afectando directamente a la seguridad y tranquilidad de la población, pues como sucede en los casos de chantaje sexual, los delincuentes tienen una situación de ventaja frente a las víctimas, por lo que es imposible poder reconocer su identidad y mucho menos su ubicación. Sin embargo, no puede investigarse adecuadamente pues el Art. 230° del Código Procesal Penal, exige diversos presupuestos, siendo que, en los delitos de chantaje sexual, la pena no supera los cuatro años según lo estipulado en el Art. 176-C del Código Penal. Es por ello, que esta investigación tecnológica de tipo documental teórica o bibliográfica busca resolver problemas referidos a la impunidad en los delitos contra la libertad sexual en su modalidad de chantaje sexual, desarrollando entre los objetivos específicos, el análisis del Art. 230 del Código Procesal Penal para determinar la eficacia de la medida en la investigación y persecución de delitos de chantaje sexual tipo base, además de sustentar en el Derecho Nacional y comparado la modificación del Art. 230° del Código Procesal Penal en cuanto a las investigaciones fiscales en los delitos de chantaje sexual. / In recent years, due to the increase of information and communication technology, it has been evidenced through extensive research that new modalities called cybercrimes have emerged, directly affecting the security and tranquility of the population, because as in cases of sexual blackmail, criminals have an advantage over the victims, so it is impossible to recognize their identity, much less their location. However, it cannot be properly investigated because Art. 230° of the Criminal Procedural Code requires several assumptions, being that, in the crimes of sexual blackmail, the penalty does not exceed four years as established in Art. 176-C of the Criminal Code. Therefore, this technological research seeks to solve problems related to impunity in crimes against sexual freedom in its modality of sexual blackmail, through the analysis of Art. 230 of the Criminal Procedural Code to determine the effectiveness of the measure in the investigation and prosecution of base type sexual blackmail crimes, in addition to sustaining in national and comparative law the modification of Art. 230° of the Criminal Procedural Code regarding prosecutorial investigations in sexual blackmail crimes
118

Wetgewing teen elektroniese betreding

Ulrich, Neil. 11 1900 (has links)
Text in Afrikaans / Parralel met die snelle groei van rekenaartegnologie en die groteiwordende rol wat rekenaars in ans alledaagse lewe speel, is daar ongelukkig 'n toename in die misbruik van rekenaars. Benewens die wyses om rekenaarmisbruik by wyse van remedies in die siviele reg aan te spreek, is dit hoofsaaklik die taak van die strafreg om sodanige misbruik te kriminaliseer en deur middel van straf sulke misbruik te voorkom en oortreders af te skrik. Uit 'n ontleding van die Suid-Afrikaanse strafreg het dit geblyk dat bestaande misdrywe, beide gemeenregtelik en statuter, nie voldoende rekenaarmisbruik kan kriminaliseer en aanspreek nie. Wetgewing blyk die mees gepaste optossing te wees. Uit 'n regsvergelykende studie van die hantering van rekenaarmisbruik in jurisdiksies waar die wetgewer verskillende benaderings toegepas het, het dit geblyk dat die mees gepaste wyse om rekenaarmisbruik te kriminaliseer sal wees om ongemagtigde rekenaarbetreding as moedermisdaad te bestraf aangesien dit die fondament is waarop enige verdere misbruik van 'n rekenaar gebaseer word. Daarbenewens moet verdere meer spesifieke misbruikshandelinge wyd omskryfword as misdrywe, ten opsigte van meer emstige misbruik na betreding van 'n rekenaar / Parallel with the growth in computer technology and increasing use of computers, there has been an increase in computer misuse. In addition to addressing different methods of computer misuse in terms of civil law remedies, it is mainly the task of the criminal law to criminalise such misuse, prevent computer misuse and deter offenders by means of punishment. It was clear from a study of South African criminal law that existing offences, both statutory and in terms of the common law, do not criminalise and address computer misuse effectively. It therefore seems that legislation would be the most appropriate solution. It appeared from a comparative study of jurisdictions where legislators approach computer misuse differently, that the most effective way of criminalising computer misuse would be to criminalise una1,1thorised computer accessing as basic offence. In addition thereto more specific further acts of serious computer misuse, defined broadly, should be criminalised / Criminal & Procedural Law / LL.M. (Criminal & Procedural Law)
119

www.crimesagainstchildren.com: addressing child pornography via the internet in Africa

Asubiaro, Omowumi Modupe January 2004 (has links)
The study focus on child pornography on the Internet as a manifestation of sexual abuse and sexual exploitation of children. The debate centres around the exacerbated effect of child pornography on victims and subsequent effects on the society. Ultimately, the study aims to highlight the various legal and non-legal responses specific to child pornography on the Internet with a view to proffer solutions to African states on how to deal with the problem. The study also lend an African voice to the ongoing debate on how to deal with the problem of child pornography on the Internet
120

Aspectos processuais e penais dos crimes de computador

Torre, Marina Giantomassi Della 06 May 2009 (has links)
Made available in DSpace on 2016-04-26T20:29:02Z (GMT). No. of bitstreams: 1 Marina Giantomassi Della Torre.pdf: 490215 bytes, checksum: c01546dbd7fe68ae1b0015e00df366c6 (MD5) Previous issue date: 2009-05-06 / We live in the midst of a technological revolution. In the wake of innovation, a traditional and conservative judicial order faces, simultaneously, an old and new reality. While the old reality is based on concepts and habits either built or resulting from facts and activities that can be perceived and identified; the new reality is based on a virtual mean, where new relationships arise (not necessarily connected to the real world), requiring new concepts and interpretations. The use of telematics leads to a considerable change in the habits of those who make use of it, enabling their definitive inclusion in an increasingly dynamic world. The emergence of telematics poses many challenges in the Law field. Among the main ones, we highlight the need to establish regulation for criminal conducts carried out in this mean. Given its characteristics, it requires the establishment of a paradigm for preventive control, in addition to severe repressive means. Using the relationships between Brazilian law, comparative law, discussions of doctrine and jurisprudence and proposals of this new scenario, we seek to analyze a set of questions, including juridical goods affected by telematics crimes; supposed criminals and their victims; and problems related to their types and competencies. The identification of authors and relative relevancies are also needed for this new and complex fashion of crimes: technology crimes resulting from a new global and risky information society. Lastly, seeking to protect the principles of the Federal Constitution, both the citizen and State s fundamental rights and guarantees must be secured, reinforcing the base of the Democratic State of law. This must be done through a judgment consideration that observes the proportionality principle, in every single situation that requires investigation and punishment of crimes of this nature / Vivemos uma revolução no âmbito da tecnologia. Neste despertar de inovações, uma ordem jurídica tradicional e conservadora, baseada em relações e conceitos historicamente construídos e derivados de usos e costumes fundamentalmente dependentes de fatos e atividades perceptíveis e identificáveis, depara-se com uma velha e uma nova realidade, pela qual surgem novas relações, totalmente diversas do mundo real, e que exigem novos conceitos e interpretações. A existência da telemática mostra-se como uma considerável mudança nos hábitos cotidianos daqueles que a utilizam, promovendo sua inclusão definitiva em um mundo cada vez mais dinâmico. No campo do Direito, o seu surgimento propõe vários desafios, entre os quais o mais manifesto é a necessidade de se criar mecanismos reguladores para as condutas criminosas desenvolvidas nesse meio, que impõe, pelas suas características, além de paradigma de controle repressivo mais severo, um paradigma preventivo em nossa legislação. Utilizando de uma relação entre a lei brasileira, o direito comparado, as discussões doutrinárias e jurisprudenciais e propostas dessa nova conjuntura, procuramos analisar uma série de questões, dentre elas os bens jurídicos atingidos pela criminalidade informática, o pretensos criminosos e suas vítimas, problemas acerca da tipicidade e competência. Mostra-se necessária, também, a identificação de autoria e materialidade relativas a essa nova e complexa modalidade de ilícitos: a criminalidade informática, surgida em uma sociedade global de risco informático e da informação. Por fim, com o objetivo de resguardar os princípios trazidos pela Constituição Federal, tanto os direitos e garantias fundamentais do cidadão quanto os direitos e garantias do Estado, devem ser assegurados, reforçando-se as bases de um Estado Democrático de Direito, por meio de um juízo de ponderação que observe o princípio da proporcionalidade, toda vez que se fizer necessária a apuração e punição da prática de crimes dessa natureza

Page generated in 0.0854 seconds