Spelling suggestions: "subject:"computer crimes"" "subject:"coomputer crimes""
31 |
An analysis of Linux RAM forensicsUrrea, Jorge Mario. 03 1900 (has links)
During a forensic investigation of a computer system, the ability to retrieve volatile information can be of critical importance. The contents of RAM could reveal malicious code running on the system that has been deleted from the hard drive or, better yet, that was never resident on the hard drive at all. RAM can also provide the programs most recently run and files most recently opened in the system. However, due to the nature of modern operating systems, these programs and files are not typically stored contiguously-which makes most retrieval efforts of files larger than one page size futile. To date, analysis of RAM images has been largely restricted to searching for ASCII string content, which typically only yields text information such as document fragments, passwords or scripts. This thesis explores the memory management structures in a SUSE Linux system (kernel version 2.6.13-15) to make sense out of the chaos in RAM and facilitate the retrieval of files/programs larger than one page size. The analysis includes methods for incorporating swap space information for files that may not reside completely within physical memory. The results of this thesis will become the basis of later research efforts in RAM forensics. This includes the creation of tools that will provide forensic analysts with a clear map of what is resident in the volatile memory of a system.
|
32 |
The role of government in the Nigerian mobile telecommunications industry: a focus on cybercrime and mobile broadband policiesObi, Isioma Ruby January 2017 (has links)
A research report submitted to the Faculty of Commerce, Law and Management, University of the Witwatersrand, Johannesburg, in fulfilment of the requirements for the degree of Masters of Management by Dissertation (MM-D).
October, 2016 / The role played by a governing authority is crucial to the long term survival and development of its governed unit, irrespective of the size and function of the said unit. In the event that a government fails to protect the interests of its governed, a state of wide-spread dissatisfaction and palpable frustration becomes inevitable.
Through the application of an Interpretive Research Paradigm, this study assessed the role of the Nigerian government in one of the country’s most promising industries; The Mobile Telecommunications Industry. The study aimed to expose the predominant role of the Nigerian government in this industry with a focus on the relevant issues of Cybercrime and Mobile Broadband. This research enquiry applied the Qualitative Research Approach. As such, the researcher analyzed relevant policy documents on telecommunications and elicited the expert opinions of key industry players. In all, 18 industry representatives were questioned about the happenings in the Mobile Telecommunications Industry. The interview respondents for this research study included representatives of the Ministry of Communications, individuals within the Nigerian Communications Commission, and Mobile Telecommunications service providers/operators. To further validate the information gathered from these individuals, various industry reports were also examined.
After a thorough analysis of the research data gathered from multiple sources, the conclusion drawn by this study was that the Nigerian government has failed to do what is necessary to ensure the long-term growth and development of the country’s Mobile Telecommunications Industry. The study proved that the government has constantly taken a somewhat lackadaisical stance with regard to the implementation of the policies and initiatives governing the industry and has subsequently given no explanations or justifications for its actions, or more appropriately, inactions.
Conclusively, this research study recommended that the governing environment of the Nigerian Mobile Telecommunications Industry be restructured to include a government that not only formulates telecoms development strategies and expansion initiatives, but also executes these plans whilst maintaining an unwavering accountability for its actions and decisions. / MT 2017
|
33 |
Hacks, cracks, and crime an examination of the subculture and social organization of computer hackers /Holt, Thomas J. January 1900 (has links)
Title from title page of PDF (University of Missouri--St. Louis, viewed February 22, 2010). Includes bibliographical references (p. 192-201).
|
34 |
Modelling cybercrime and risk for New Zealand organisationsRoberts, C. M, n/a January 2009 (has links)
The Internet is now fundamental to the global economy. Growing from an experimental and research network in the late 1960's, it is now the foundation of a wide range of economic, infrastructure support, communication and information sharing activities. In doing so it has also provided a vehicle for cybercrime. Organised cybercrime and state-sponsored malicious cyber activity are predicted to become the predominant cyber threats over the next five to ten years.
Corporate governance is playing an increasingly important role in ensuring compliance with the growing body of legislation and regulation, protecting the interests of stakeholders. At the same time there is a divergence in organisational awareness, understanding, strategy and application between business objectives, risk management and good security practices. Organisations are finding increasing difficulty in managing the scope and extent of the cyber-threat environment, exacerbated by confusion over risk tools, approaches and requirements.
This study provides a pragmatic and practical framework for organisational risk assessment, already proved over several years of use. This is supported by three national surveys which provide important data for sound risk identification and assessments. This survey data is organised through a Data Schema which is simple, rational and flexible enough to accommodate new technologies and types of cyber-attacks, as well as allowing for the decommissioning of technologies and the abandonment of attack methods.
For many organisations this risk framework will be sufficient to meet their corporate governance and risk management requirements. For organisations wishing to refine their approach, a Bayesian model has also been developed, building on previous work, incorporating data from the surveys and, through the Data Schema, allowing the incorporation of probabilities and other evidence to enhance the risk assessment framework. Again this model is flexible, accommodating changes, growth and new technologies.
|
35 |
Digital receipts : a system to detect the compromise of digital certificates /Seeley, Nathaniel January 2006 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2006. / Includes bibliographical references (p. 55-57).
|
36 |
Cyberbullying responses of adolescents and parents toward digital aggression /Wong-Lo, Mickie. Bullock, Lyndal M., January 2009 (has links)
Thesis (Ph. D.)--University of North Texas, Dec., 2009. / Title from title page display. Includes bibliographical references.
|
37 |
The development of an open-source forensics platformKoen, Renico. January 2009 (has links)
Thesis (MSc (Computer science))--University of Pretoria, 2009. / Includes bibliographical references (137-144 p.).
|
38 |
Cyberbullying and cybervictimization : prevalence, stability, risk and protective factors, and psychosocial problems /Cappadocia, Mary Catherine. January 2008 (has links)
Thesis (M.A.)--York University, 2008. Graduate Programme in Psychology. / Typescript. Includes bibliographical references (leaves 53-60). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:MR51515
|
39 |
Characterization of cyber attacks through variable length Markov models /Fava, Daniel Schnetzer. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 75-80).
|
40 |
Analysis of digital evidence in identity theft investigationsAngelopoulou, Olga January 2010 (has links)
Identity Theft could be currently considered as a significant problem in the modern internet driven era. This type of computer crime can be achieved in a number of different ways; various statistical figures suggest it is on the increase. It intimidates individual privacy and self assurance, while efforts for increased security and protection measures appear inadequate to prevent it. A forensic analysis of the digital evidence should be able to provide precise findings after the investigation of Identity Theft incidents. At present, the investigation of Internet based Identity Theft is performed on an ad hoc and unstructured basis, in relation to the digital evidence. This research work aims to construct a formalised and structured approach to digital Identity Theft investigations that would improve the current computer forensic investigative practice. The research hypothesis is to create an analytical framework to facilitate the investigation of Internet Identity Theft cases and the processing of the related digital evidence. This research work makes two key contributions to the subject: a) proposing the approach of examining different computer crimes using a process specifically based on their nature and b) to differentiate the examination procedure between the victim’s and the fraudster’s side, depending on the ownership of the digital media. The background research on the existing investigation methods supports the need of moving towards an individual framework that supports Identity Theft investigations. The presented investigation framework is designed based on the structure of the existing computer forensic frameworks. It is a flexible, conceptual tool that will assist the investigator’s work and analyse incidents related to this type of crime. The research outcome has been presented in detail, with supporting relevant material for the investigator. The intention is to offer a coherent tool that could be used by computer forensics investigators. Therefore, the research outcome will not only be evaluated from a laboratory experiment, but also strengthened and improved based on an evaluation feedback by experts from law enforcement. While personal identities are increasingly being stored and shared on digital media, the threat of personal and private information that is used fraudulently cannot be eliminated. However, when such incidents are precisely examined, then the nature of the problem can be more clearly understood.
|
Page generated in 0.0787 seconds