• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 15
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 28
  • 28
  • 16
  • 11
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 6
  • 6
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Immunology Inspired Detection of Data Theft from Autonomous Network Activity

Cochran, Theodore O. 01 April 2015 (has links)
The threat of data theft posed by self-propagating, remotely controlled bot malware is increasing. Cyber criminals are motivated to steal sensitive data, such as user names, passwords, account numbers, and credit card numbers, because these items can be parlayed into cash. For anonymity and economy of scale, bot networks have become the cyber criminal’s weapon of choice. In 2010 a single botnet included over one million compromised host computers, and one of the largest botnets in 2011 was specifically designed to harvest financial data from its victims. Unfortunately, current intrusion detection methods are unable to effectively detect data extraction techniques employed by bot malware. The research described in this Dissertation Report addresses that problem. This work builds on a foundation of research regarding artificial immune systems (AIS) and botnet activity detection. This work is the first to isolate and assess features derived from human computer interaction in the detection of data theft by bot malware and is the first to report on a novel use of the HTTP protocol by a contemporary variant of the Zeus bot.
12

Cyber Profiling for Insider Threat Detection

Udoeyop, Akaninyene Walter 01 August 2010 (has links)
Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses. Until the 21st century, insiders were often overlooked as suspects for these attacks. The 2010 CERT Cyber Security Watch Survey attributes 26 percent of cyber crimes to insiders. Numerous real insider attack scenarios suggest that during, or directly before the attack, the insider begins to behave abnormally. We introduce a method to detect abnormal behavior by profiling users. We utilize the k-means and kernel density estimation algorithms to learn a user’s normal behavior and establish normal user profiles based on behavioral data. We then compare user behavior against the normal profiles to identify abnormal patterns of behavior.
13

Cyber Profiling for Insider Threat Detection

Udoeyop, Akaninyene Walter 01 August 2010 (has links)
Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses. Until the 21st century, insiders were often overlooked as suspects for these attacks. The 2010 CERT Cyber Security Watch Survey attributes 26 percent of cyber crimes to insiders. Numerous real insider attack scenarios suggest that during, or directly before the attack, the insider begins to behave abnormally. We introduce a method to detect abnormal behavior by profiling users. We utilize the k-means and kernel density estimation algorithms to learn a user’s normal behavior and establish normal user profiles based on behavioral data. We then compare user behavior against the normal profiles to identify abnormal patterns of behavior.
14

Ungdomars medvetenhet om IT-relaterad brottslighet

Cseplö, Madeleine, Wilhelmsson, Anna, Korsbo, Jonna January 2014 (has links)
Världen vi lever i blir allt mer teknisk för var dag som går, men följer vår kunskap med i denna utveckling? Tyvärr är det inte så, allt för få reflekterar över de risker denna utveckling medför samt hur våra lagar appliceras i denna miljö. På grund av detta kan det vara svårt för både unga och vuxna att veta vad som är tillåtet och ej i den teknologins värld. Numera introduceras barn och ungdomar tidigt för tekniken och debuten för deras självständiga användande av tekniken i allt lägre åldrar och har en stor roll i både utbildningen samt för det sociala umgänget. De sociala medierna har blivit en del av ungdomars vardag och detta har medfört att handlingar som näthat dessvärre har ökat.   Vårt mål med arbetet har varit att skapa en dialog om IT-relaterade brott ungdomar emellan, men även för att upplysa äldre generationer om problemet. Det vi kan konstatera är att det definitivt finns ett behov av att informera ungdomar om ämnet, då mer än hälften av eleverna själva (59.2 %) säger att de vill ha en halvdag i skolan om IT-relaterade brott. Elevernas kunskap om IT-relaterad brottslighet varierade mellan åldrarna, de yngsta kände sig säkrare på vad som på Internet är tillåtet och inte medan enbart 60.5 % av de äldsta eleverna kände sig tillräckligt informerade. Ett annat framtaget resultat är att flera av eleverna har en oroväckande inställning till kränkningar och hat på Internet. De menar att det numera sker så mycket och ofta att de inte längre ser det som ett större problem. Dessutom är det inte många som känner sig oroliga för konsekvenserna om de skulle utföra något olagligt via Internet, endast drygt hälften av de äldre.   Omfattningen av vårt arbete är långt ifrån stor då fallstudien enbart genomfördes på en skola, detta då det var den enda skolan som anmälde sitt intresse till att medverka. Trots detta, är resultaten från vår undersökning mycket intressanta och säger även en hel del om hur medvetenheten antagligen ser ut hos många ungdomar idag. / The world we live in is becoming more technological each day that goes by, but does our knowledge follow this development? Unfortunately that’s probably not the case, because it seems that all too few reflect over the risks caused by these developments and how the Swedish laws are applied in this environment. Because of this, it can be difficult for both young and adults to know what is allowed and not in the world of technology. In this modern age the use of technology has its debut in earlier ages and plays a major role in both the education and for social interactions. The social media has become a part of young people's everyday lives and also unfortunately contributed to the increase of actions like hate crimes over the Internet.   The goal of this project was to create a dialogue about cyber crimes among young people, but also to educate the older generation of the problem. More than half of the students involved in our study, (59.2 %), said that they wanted devote some of their time at school to address cyber-crimes. With this at hand we can establish that there definitely is a need to inform young people about this subject. The pupils knowledge about cyber crimes varied between the ages, the youngest were more confident about what they are allowed to do on the Internet or not. While only 60.5 % of the oldest students felt sufficiently informed. Another finding is that several of the students have a disturbing attitude towards not only hate crimes over the Internet but also cyber crimes in general. They are under the impression that because of the increased frequency of the crimes they no longer consider it to be a major issue. Also, if they would perform an illegal act, there are only a few of the students that would worry about the consequences, in this case it was only about half of the older students.   The extent of this study is far from substantial, since the study was limited to one school, this because there was only one of the schools that wanted to participate. Despite that fact, the results from the study are very interesting, and it says a lot about how the mentality towards these kinds of crimes are amongst young people today.
15

La preuve numérique dans le procès pénal / The digital evidence in the criminal trial

Hennequin, Shirley 12 December 2011 (has links)
Support de la nouvelle société de l’information et de la communication, outil de travail mais également de loisir, le numérique est « partout ». Devenu la mémoire virtuelle de l’homme, le « numérique », constitue un terrain d’investigation privilégié, une source d’informations intarissable. Le principe de la liberté des preuves en procédure pénale a offert au numérique la possibilité de jouer un rôle majeur : parfois preuve de l’infraction, de son imputabilité à un auteur et/ou de son identité, il est devenu incontournable. Ce constat est toutefois limité, ce principe ne signifiant pas que l’on puisse agir de n’importe quelle manière, à sa guise quels que soient le lieu et l’heure ; la preuve numérique devant être recherchée et recueillie dans les règles de l’administration de la preuve. Soumise à l’intime conviction du juge, la donnée numérique devra également revêtir des garanties d’intégrité et de fiabilité, avant d’être considérée comme une « preuve ». En définitive, ces observations imposent que, les caractères généraux de la preuve numérique et son rôle probatoire attendu soient étudiés afin d’envisager comment cette nouvelle preuve se confronte au régime probatoire pénal / As a medium of the new society of information and communication and as a tool used both for work and play, digital technology has become ubiquitous. It has become man's virtual memory and represents a preferred field for investigation, an inexhaustible source of information. The principle of freedom of evidence in criminal law has allowed digital technology to play a major role : sometimes as evidence of infringement, of its author's imputability and/or identity, it has become inescapable. This general assessment is however limited, as it does not mean that any action can be taken anyhow, whatever the place or time ; digital evidence must indeed be searched for and collected within the rules governing it. Being subjected to the judge's inner conviction, the digital data will also have to offer guarantees of integrity and reliability before being considered as evidence on balance, these observations require that the general characteristics and expected role of digital evidence should be studied in order to examine how this new kind of evidence can be confronted with the system of evidence in criminal law
16

Lutte aux botnets : les politiques de prévention s'avèrent-elles efficaces?

Allaire, Marie-Renée 07 1900 (has links)
No description available.
17

Anti-cyberlaundering regulation and control

Leslie, Daniel A. January 2010 (has links)
<p>This paper is inspired by the ills borne out of the internet. The internet has become a modern day tool for criminals seeking to conceal the proceeds derived from their crime, hence the&nbsp / problematic notion of cyberlaundering. This paper journeys through the world of cyberlaundering by looking into the structure of the crime in great depth. It explores various possibilities, and tries to hatch out viable solutions to the dilemma.</p>
18

Anti-cyberlaundering regulation and control

Leslie, Daniel A. January 2010 (has links)
<p>This paper is inspired by the ills borne out of the internet. The internet has become a modern day tool for criminals seeking to conceal the proceeds derived from their crime, hence the&nbsp / problematic notion of cyberlaundering. This paper journeys through the world of cyberlaundering by looking into the structure of the crime in great depth. It explores various possibilities, and tries to hatch out viable solutions to the dilemma.</p>
19

The psychological effects experienced by computer forensic examiners working with child pornography

Whelpton, Juliette 02 1900 (has links)
Convergence of technology has made access to the Internet faster, easier and cheaper. Criminals, including paedophiles, child abusers and pornography traders make use of this technology to commit criminal offences. Computer Forensic Examiners (CFEs) are members of the Cyber Crime Unit, a professional, specialised unit of the South African Police Service (SAPS) who are responsible for computer forensic examination including the investigation of child pornographic images. The aim of the study was to seek understanding on what psychological effects the CFEs experienced when working with the images and was conducted from within the social constructionism and the narrative frameworks. The images had a severe impact on the CFEs as was clearly uncovered in the stories of six CFEs who participated in this study. The participants' stories were recorded and transcribed after which the application of thematic content analysis found that the participants all suffered similar negative effects. These findings were integrated with the findings of a focus group as well as with the findings of a similar study that was conducted during the same time by the Crimes against Children Research Center at the University of New Hampshire and resulted in identifying symptoms of trauma and stress experienced by the CFEs. Based on these results recommendations regarding the support for the CFEs were made. / Psychology / M.A. (Psychology)
20

Polismyndighetens utredning av sexuellt digitalt våld mot barn : En kvalitativ studie om praktikers upplevelser och erfarenheter kring hinder och förutsättningar i utredningsarbetet samt praktikernas eventuella påverkan av arbetet

Markfjärd, Cecilia, Mehanna, Diana, Olofsson, Jennie January 2019 (has links)
Föreliggande studie har genom nio semi-strukturerade kvalitativa intervjuer undersökt utredares, förundersökningsledares samt åklagares upplevelser och erfarenheter inom Polismyndighetens utredningsarbete, vad gäller sexuellt digitalt våld mot barn (under 18 år). Detta för att eventuellt kunna identifiera möjliga utvecklingsområden inom utredningsarbetet vad gäller att skicka oönskade nakenbilder samt att otillåtet sprida nakenbilder på någon annan. Detta då uppklaringsandelen i relation till antalet anmälningar vad gäller dessa brott kan anses vara låg. Således blev praktikers upplevelser och erfarenheter av arbetsprocessen samt om och i sådana fall hur de påverkas av att arbeta med sexuellt digitalt våld centralt. Resultatet påvisar att praktikerna lyfter flera aspekter av sitt arbete såsom bra ledarskap, utformningen av arbetsgrupper samt snabba samarbeten som välfungerande moment i utredningsarbetet. Flera utvecklingsområden framkom även där det bland annat efterfrågas klarare riktlinjer, samt mer metodstöd, kunskap och utbildning inom området för att öka effektiviteten i arbetet. Exponeringen i deltagarnas arbete med sexuellt digitalt våld mot barn, tillsammans med den stress praktikerna upplever utifrån deras arbetsbelastning, erfars bidrar till en negativ påverkan och minskad arbetskapacitet. Dock belyses att stöd och hjälp finns att tillgå som motverkar den negativa påverkan. Studiens resultat diskuteras utifrån tidigare forskning inom området samt i relation till organisationsteori. / The present study has, through nine qualitative semi-structured interviews, examined investigators’, requisitors’ and prosecutors’ experiences of the police authority's investigative work regarding sexual digital violence against children (under age 18). The study aimed to identify areas of development within the investigative work regarding receiving unwanted nude images and unauthorized spreading of nude pictures of others. This because of the low crime clearance rate of reported crimes. Thus practitioners’ experience of their work process, including if and how they were affected by working with sexual digital violence, were essential. The results from the interviews highlighted several aspects of the work such as good leadership, team design, and rapid collaborations as well-functioning components. Several areas of development also emerged such as clearer guidelines, increased methodological support, increased level of knowledge, and education, to increase the work efficiency. The exposure to sexual content in the participants' work combined with the stress derived from their workload was experienced to contribute to a negative impact and reduced work capacity. However, it was highlighted that support and help was available to lessen the negative impact. The study's results were discussed based on previous research in the field and in relation to organizational theory.

Page generated in 0.0332 seconds