Items

Details

A history and categories of cybercrime
Basic cybercrime terms
Birth of the White Hats
The origin of the Black Hat label in the United States and Britain
Y2K : fears emerge about cyberterrorism
Post-Y2K incidents exacerbating cyberterrorist fears
Countering cyberterrorists : the U.S. Homeland Security Act of 2002
Incidents exacerbating cyberterrorism anxieties
The importance of social engineering to cybercriminals
Categories of cybercrime : harm to property and/or to persons
Criminal liability and the coincidence of four elements
The increasing complexity of property cybercrime
Cybercrimes against persons
The nonoffenses of cybervigilantism and hacktivism
Issues, controversies, and solutions
Overview of the number of reported incidents of computer system intrusions, government agencies, and institutions
Methods used to commit cybercrime, cases, and countermeasures
Controversies surrounding intellectual property rights, copyright, and the Digital Millennium Copyright Act
Controversial "non-cases" of cracking
Overview of system vulnerabilities and related controversies
How chief operating officers worldwide are feeling about their systems' vulnerabilities and why
A case study : outlining the "real" threat of a possible coordinated terror attack
Using honeypots to better know "the enemy", and controversies surrounding them
More question of interest : operating systems software
are some more vulnerable to cracking exploits than others?
Global legislative countermeasures and controversies : the Council of Europe Convention on Cybercrime
Chronology
Biographical sketches
Cybercrime legal cases
A summary of recent U.S. anti-terror and anti-cybercrime legislation
General observations about recent trends in cybercrime
Timeline and description of recent computer crimes prosecuted under the U.S. Computer Crime Statute U.S.C. section 1030.

Browse Subjects

Show more subjects...

Statistics

from
to
Export