325,160 research outputs found

    Legal information protection of the systems of information support for an enterprise (computer programs and databases)

    Get PDF
    Рассматриваются правовые аспекты защиты информации в информационных системах (компьютерные программы и базы данных) в комплексе с другими видами обеспечения защиты, предложена стратегия защиты электронной информации предприятия.Discusses the legal aspects of information security in information systems (computer programs and databases) in conjunction with other types of protection, the strategy of electronic information protection for an enterprise is proposed

    Paper Session IV: Development and Delivery of Coursework - The Legal/Regulatory/Policy Environment of Cyberforensics

    Get PDF
    This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through cyber-forensic techniques. This paper discusses different pedagogies that can be used (including project teams, research and writing assignments, student presentations, case analyses, class activities and participation and examinations), evaluation methods, problem-based learning approaches and critical thinking analysis. A survey and evaluation is provided of the growing body of applicable print and online materials that can be utilized. Target populations for such a course includes students with majors, minors or supporting elective coursework in law, information sciences, information technology, computer science, computer engineering, financial fraud, security and information assurance, forensic aspects of cyber security, privacy, and electronic commerce. Keywords: Cyberforensics; Electronic Data Discovery; Electronic Records Management; Pre-Trial Discovery; Admissibility of Electronic Evidence; Information Assurance, Security and Risk Analysi

    Development and Delivery of Coursework: The Legal/Regulatory/Policy Environment of Cyberforensics

    Get PDF
    This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through cyber-forensic techniques. This paper discusses different pedagogies that can be used (including project teams, research and writing assignments, student presentations, case analyses, class activities and participation and examinations), evaluation methods, problem-based learning approaches and critical thinking analysis. A survey and evaluation is provided of the growing body of applicable print and online materials that can be utilized. Target populations for such a course includes students with majors, minors or supporting elective coursework in law, information sciences, information technology, computer science, computer engineering, financial fraud, security and information assurance, forensic aspects of cyber security, privacy, and electronic commerce

    The Practice Research of Artificial Intelligence in Computer Network Technology in the New Era

    Get PDF
    This paper summarizes the practical application and development trend of artificial intelligence technology in the field of computer network. Artificial intelligence has been widely used in network communication, management and security, and other aspects, to achieve the network independent optimization, fault self-healing, threat identification and other intelligent capabilities. Artificial intelligence is a key technology to promote the evolution of the next generation network to the direction of adaptive, intelligence and security. The use of artificial intelligence also faces challenges such as algorithm deviations and regulatory constraints. Collaborative innovation algorithms and systems and the establishment of legal ethics systems are needed to promote the healthy development of AI and the progress of computer networks

    Does your wireless LAN have criminal intent?

    Get PDF
    All of the literature relating to wireless network security has focused on the flaws, newer alternatives and suggestions for securing the network. There is much speculation and anecdotal statements in relation to what can happen if a breach occurs, but this is mostly from a computer security perspective, and mostly expressed in terms of potential for financial loss. This paper examines the potential legal ramifications of failing to properly secure a wireless network. Several scenarios are examined within based on usage of wireless on the various category of attack. Legal opinion, backed up with case law, is provided for each scenario. Several examples are given for unauthorised use, with other aspects having potential for prosecution. The conclusion is that no matter whether you are a home user of wireless, a small to medium business or a large enterprise, there a legal as well as financial reasons to properly secure your wireless network

    Capacidades técnicas, legales y de gestión para equipos de blue team y red team

    Get PDF
    El presente informe técnico se plasma el proceso de cada escenario propuesto en cada una de las acciones Blue team, Red team como también los aspectos legales consignando. Los aspectos relevantes del desarrollo de las actividades relacionadas con el seminario especialización en Seguridad Informática, equipos estratégicos en ciberseguridad Red Team & BlueTeam, exponiendo la seguridad de la empresa The Whitehouse Security. En el desarrollo de las actividades encomendadas por la empresa WHITEHOUSE SECURITY con el fin de llevar a cabo el reclutamiento del personal se desarrollaron actividades con el fin de analizar y desarrollar los siguientes informes: Etapa 1 - Conceptos equipos de Seguridad, Etapa 2 - Actuación ética y legal, Etapa 3 - Ejecución pruebas de intrusión y Etapa 4 - Contención de ataques informáticosThis technical report reflects the process of each scenario proposed in each of the actions Blue team, Red team as well as the legal aspects recorded. The relevant aspects of the development of the activities related to the seminar specializing in Computer Security, strategic teams in cybersecurity Red Team & BlueTeam, exposing the security of the company The Whitehouse Security. In the development of the activities entrusted by the company WHITEHOUSE SECURITY in order to carry out the recruitment of personnel, activities were developed in order to analyze and develop the following reports: Stage 1 - Concepts of Security teams, Stage 2 - Ethical performance and legal, Stage 3 - Execution of intrusion tests and Stage 4 - Containment of computer attack

    Capacidades técnicas, legales y de gestión para equipos blueteam y redteam

    Get PDF
    El presente informe técnico se plasma el proceso de cada escenario propuesto en cada una de las acciones Blue team. Red team como también los aspectos legales consignando, Los aspectos relevantes del desarrollo de las actividades relacionadas con el seminario especialización en Seguridad Informática, equipos estratégicos en ciberseguridad Red Team & BlueTeam, exponiendo la seguridad de la empresa The Whitehouse Security. En el desarrollo de las actividades encomendadas por la empresa WHITEHOUSE SECURITY con el fin de llevar a cabo el reclutamiento del personal se desarrollaron actividades con el fin de analizar y desarrollar los siguientes informes: Etapa 1 Conceptos equipos de Seguridad, Etapa 2 - Actuación ética y legal, Etapa 3 Ejecución pruebas de intrusión y Etapa 4-Contención de ataques informáticos.This technical report reflects the process of each scenario proposed in each of the Blue team actions. Red team as well as the legal aspects consigning, The relevant aspects of the development of activities related to the seminar specializing in Computer Security, computers strategies in cybersecurity Red Team & BlueTeam, exposing the security of The Whitehouse Security Company. In the development of the activities entrusted by the company WHITEHOUSE SECURITY in order to carry out the recruitment of personnel were developed activities in order to analyze and develop the following reports: Stage 1 Safety team concepts, Stage 2 - Ethical and legal action, Stage 3 Execution of intrusion tests and Stage 4-Containment of computer attacks

    Guest Editors’ Introduction-Special Issue on Digital Society and E-Technologies

    Get PDF
    It is evident that E-Technology (i.e. The Internet, social media… etc.) play a significant role in maintaining and supporting our digital society in various sectors from business, education, health and government and others. E-Technologies are now available worldwide for numerous numbers of universal users to increase collaboration, communication, interaction, creativity, critical thinking and problem solving in developing and developed countries. It is anticipated, and there is evidence gathering that E-technologies use will increase work performance, productivity, innovation, workers’ satisfaction, reduce cost and maintenance. On the other hand, adopting e-technologies will bring various negative aspects in relation to security, privacy, legal aspects and users’ frustration, as majorities of these e-technologies are still neglecting important aspects, i.e. Human Computer Interaction and usability. It is anticipated that these aspects will assist to improve the system functionality, which can be used efficiently, effectively and satisfactorily by universal users, including people with disability
    corecore