• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 117
  • 8
  • 5
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 162
  • 162
  • 53
  • 39
  • 36
  • 36
  • 34
  • 34
  • 31
  • 30
  • 29
  • 29
  • 29
  • 27
  • 25
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Die Convention on Cybercrime und österreichisches Strafrecht /

Beer, Johannes. January 1900 (has links)
Thesis (doctoral)--Johannes-Kepler-Universität, Linz, 2005.
62

Recommendations for a comprehensive identity theft victimization survey framework and information technology prevention strategies /

Berg, Sara E. January 2006 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2006. / Typescript. Includes bibliographical references (leaves 64-71).
63

Design and analysis of information fusion, dynamic sensor management rules for cyber security systems using simulation /

McConky, Katie Theresa. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 101-103).
64

Architecture for an automated IRC investigation tool

Brown, Dugald A. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2007. / Title from document title page. Document formatted into pages; contains v, 61 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 45-46).
65

A cyber security awareness and education framework for South Africa

Kortjan, Noloxolo January 2013 (has links)
The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy for these criminals to go unpunished. Moreover, many who use the Internet are not aware of such threats; therefore they may themselves be at risk, together with businesses and governmental assets and infrastructure. In view of this, there is a need for cyber security awareness and education initiatives that will promote users who are well versed in the risks associated with the Internet. In this context, it is the role of the government to empower all levels of society by providing the necessary knowledge and expertise to act securely online. However, there is currently a definite lack in South Africa (SA) in this regard, as there are currently no government-led cyber security awareness and education initiatives. The primary research objective of this study, therefore, is to propose a cyber security awareness and education framework for SA that will assist in creating a cyber secure culture in SA among all of its users of the Internet.
66

The management of networks with specific reference to security management

Kersten, Karin 15 August 2012 (has links)
M.Comm. / This dissertation is devoted to an investigation into the network-management environment, with special emphasis on the security aspects and the provision of a reference framework when choosing a network-management product. The dissertation is aimed at those responsible for network-management and the selection of the various network-management products by providing a framework for evaluating network management products. The first four chapters provide the background to the reference framework. The following two chapters are devoted to those aspects to be taken into consideration when evaluating a network-management product. The consolidation and the case study in chapters seven and eight provide an abridged version of the framework and illustrate how the framework could be applied to a network-management product. Chapter one provides the background to the reference framework regarding networks and network-management. The concept of network-management is introduced, as well as the three forms of architectures that could be implemented, namely centralised, hierarchical and distributed architectures. A number of network-management functions have to be taken into consideration when evaluating a network-management package, namely configuration, asset, fault, performance, accounting and security management. These functions are also covered in chapter six. Chapter two provides the background to the security aspect of the reference framework. The three main topics covered in this respect are the definition of network-security, computer crime and specific elements of network-security. This chapter also provides a springboard for the evaluation of the network-management environment, as well as an idea of what issues and measures should be addressed and taken in order to prevent, or at least minimise, the effects of network-security breaches. Chapter three covers issues relating to network-security responsibilities, with special reference to the management side of network-management, including those issues that management should take into consideration when evaluating the network-management environment. Two methods that could be implemented include network-management policies and strategies. Network-security policies and strategies encompass those issues necessary for effective security within an organisation. This chapter, however, covers the more theoretical or higher-level goals or objectives of network-management. Chapter four relates to more of the day-to-day management issues of the network-security and the network-security management services and functions that should be considered. These include issues such as network-security services, managing network access, monitoring and controlling the network security system and the maintenance and modification of the said system. Network-management product considerations are discussed in chapter five, which chapter can be viewed as the business and practical side of the reference framework. The topics discussed here are more closely related to the business considerations when evaluating a networkmanagement package and the practical issues of network-management. Topics discussed in this chapter include security and network-management products, practical approaches to choosing network-management products, critical success factors of network-management and analysis of the cost component. In contrast to these issues, the reference framework expounded in chapter six concentrates on the technical and network-management functions. Chapter six constitutes the culmination of the present dissertation in the form of a reference framework, which is for the greater part formulated along the lines of the criteria given. This reference framework is aimed at those experts enlisted to evaluate and select networkmanagement products, specifically as far as their security-management features are concerned. The areas covered include the user framework, the product framework, networkfault management, network-performance management, network-accounting management, network configuration and change management, network-security management and conformance testing. The topics discussed are, however, by no means exclusive and there are a number of other issues that have not been addressed in this dissertation, but which, depending on the network environment, would have to be taken into consideration. Chapter seven is a consolidation of the reference framework given in chapter six, as well as of some of the main points and criteria that could be considered when performing a quick evaluation of a product. This chapter does not, however, make any pretence to being exhaustive, but merely serves to highlight a few crucial criteria. Chapter eight is devoted to a case study in terms of which the reference framework is applied to a network-management product. In conclusion, a summary of the dissertation is given in chapter nine.
67

Assessing law enforcement's ability to fight cybercrime in South Africa

Moleko, Tsepo January 2015 (has links)
Cybercrime is the use of technology to support or directly facilitate a criminal activity, with logon credentials being the main information asset targeted during a cybercrime. The one time passwords used by banks to protect their clients from cybercrime are also under attack by cybercriminals. The Internet has made it easy to commit cybercrime, with perpetrators experiencing virtually no risk with huge returns. Individual cybercrime cases are sometimes small in nature, which means that the police can be reluctant to commit the resources necessary to investigate every incident. There is a distinct lack of resources, skills, knowledge and training in relation to identifying, understanding and responding to the growing threat of cybercrime. This research addresses how to solve these issues in South Africa in order for cybercrime to be tackled effectively and for perpetrators to be prosecuted.
68

Using cultural perspective to study teenage computer crime

楊立平, Young, Lap-ping, John. January 2002 (has links)
published_or_final_version / Sociology / Master / Master of Social Sciences
69

Towards an evaluation and protection strategy for critical infrastructure

Gottschalk, Jason Howard January 2015 (has links)
Critical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the “internet of things”. This list is not complete and a constant challenge exists in identifying Critical Infrastructure and its interdependencies. The purpose of this research is to highlight the importance of protecting Critical Infrastructure as well as proposing a high level framework aiding in the identification and securing of Critical Infrastructure. To achieve this, key case studies involving Cyber crime and Cyber warfare, as well as the identification of attack vectors and impact on against Critical Infrastructure (as applicable to Critical Infrastructure where possible), were identified and discussed. Furthermore industry related material was researched as to identify key controls that would aid in protecting Critical Infrastructure. The identification of initiatives that countries were pursuing, that would aid in the protection of Critical Infrastructure, were identified and discussed. Research was conducted into the various standards, frameworks and methodologies available to aid in the identification, remediation and ultimately the protection of Critical Infrastructure. A key output of the research was the development of a hybrid approach to identifying Critical Infrastructure, associated vulnerabilities and an approach for remediation with specific metrics (based on the research performed). The conclusion based on the research is that there is often a need and a requirement to identify and protect Critical Infrastructure however this is usually initiated or driven by non-owners of Critical Infrastructure (Governments, governing bodies, standards bodies and security consultants). Furthermore where there are active initiative by owners very often the suggested approaches are very high level in nature with little direct guidance available for very immature environments.
70

Digital forensic model for computer networks

Sanyamahwe, Tendai January 2011 (has links)
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.

Page generated in 0.2408 seconds