325,160 research outputs found
Recommended from our members
Improving the Judicial System to Handle Computer Crime
This paper asked professionals in the legal system to evaluate the current state and effectiveness of laws to identify and deter computer crime. Responses were evaluated with a formal structural equation model. The results generally show that legal professionals believe potential jurors have minimal knowledge of computer crime issues. More importantly, they also believe that judges have little knowledge or experience. A similar lack of knowledge by defense attorneys indicates that it could be difficult for a person accused of computer related infractions to find adequate representation. On the other hand, more experienced participants do not believe computer laws present an effective deterrent to computer crime. The bottom line is that all levels of the legal profession will need more education and training in aspects of computer security laws
Legal information protection of the systems of information support for an enterprise (computer programs and databases)
Рассматриваются правовые аспекты защиты информации в информационных системах (компьютерные программы и базы данных) в комплексе с другими видами обеспечения защиты, предложена стратегия защиты электронной информации предприятия.Discusses the legal aspects of information security in information systems (computer programs and databases) in conjunction with other types of protection, the strategy of electronic information protection for an enterprise is proposed
Paper Session IV: Development and Delivery of Coursework - The Legal/Regulatory/Policy Environment of Cyberforensics
This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through cyber-forensic techniques. This paper discusses different pedagogies that can be used (including project teams, research and writing assignments, student presentations, case analyses, class activities and participation and examinations), evaluation methods, problem-based learning approaches and critical thinking analysis. A survey and evaluation is provided of the growing body of applicable print and online materials that can be utilized. Target populations for such a course includes students with majors, minors or supporting elective coursework in law, information sciences, information technology, computer science, computer engineering, financial fraud, security and information assurance, forensic aspects of cyber security, privacy, and electronic commerce.
Keywords: Cyberforensics; Electronic Data Discovery; Electronic Records Management; Pre-Trial Discovery; Admissibility of Electronic Evidence; Information Assurance, Security and Risk Analysi
Development and Delivery of Coursework: The Legal/Regulatory/Policy Environment of Cyberforensics
This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through cyber-forensic techniques. This paper discusses different pedagogies that can be used (including project teams, research and writing assignments, student presentations, case analyses, class activities and participation and examinations), evaluation methods, problem-based learning approaches and critical thinking analysis. A survey and evaluation is provided of the growing body of applicable print and online materials that can be utilized. Target populations for such a course includes students with majors, minors or supporting elective coursework in law, information sciences, information technology, computer science, computer engineering, financial fraud, security and information assurance, forensic aspects of cyber security, privacy, and electronic commerce
The Practice Research of Artificial Intelligence in Computer Network Technology in the New Era
This paper summarizes the practical application and development trend of artificial intelligence technology in the field of computer network. Artificial intelligence has been widely used in network communication, management and security, and other aspects, to achieve the network independent optimization, fault self-healing, threat identification and other intelligent capabilities. Artificial intelligence is a key technology to promote the evolution of the next generation network to the direction of adaptive, intelligence and security. The use of artificial intelligence also faces challenges such as algorithm deviations and regulatory constraints. Collaborative innovation algorithms and systems and the establishment of legal ethics systems are needed to promote the healthy development of AI and the progress of computer networks
Does your wireless LAN have criminal intent?
All of the literature relating to wireless network security has focused on the flaws, newer alternatives and suggestions for securing the network. There is much speculation and anecdotal statements in relation to what can happen if a breach occurs, but this is mostly from a computer security perspective, and mostly expressed in terms of potential for financial loss. This paper examines the potential legal ramifications of failing to properly secure a wireless network. Several scenarios are examined within based on usage of wireless on the various category of attack. Legal opinion, backed up with case law, is provided for each scenario. Several examples are given for unauthorised use, with other aspects having potential for prosecution. The conclusion is that no matter whether you are a home user of wireless, a small to medium business or a large enterprise, there a legal as well as financial reasons to properly secure your wireless network
Capacidades técnicas, legales y de gestión para equipos de blue team y red team
El presente informe técnico se plasma el proceso de cada escenario propuesto en cada una de las acciones Blue team, Red team como también los aspectos legales consignando. Los aspectos relevantes del desarrollo de las actividades relacionadas con el seminario especialización en Seguridad Informática, equipos estratégicos en ciberseguridad Red Team & BlueTeam, exponiendo la seguridad de la empresa The Whitehouse Security.
En el desarrollo de las actividades encomendadas por la empresa WHITEHOUSE SECURITY con el fin de llevar a cabo el reclutamiento del personal se desarrollaron actividades con el fin de analizar y desarrollar los siguientes informes: Etapa 1 - Conceptos equipos de Seguridad, Etapa 2 - Actuación ética y legal, Etapa 3 - Ejecución pruebas de intrusión y Etapa 4 - Contención de ataques informáticosThis technical report reflects the process of each scenario proposed in each of the actions Blue team, Red team as well as the legal aspects recorded. The relevant aspects of the development of the activities related to the seminar specializing in Computer Security, strategic teams in cybersecurity Red Team & BlueTeam, exposing the security of the company The Whitehouse Security.
In the development of the activities entrusted by the company WHITEHOUSE SECURITY in order to carry out the recruitment of personnel, activities were developed in order to analyze and develop the following reports: Stage 1 - Concepts of Security teams, Stage 2 - Ethical performance and legal, Stage 3 - Execution of intrusion tests and Stage 4 - Containment of computer attack
Capacidades técnicas, legales y de gestión para equipos blueteam y redteam
El presente informe técnico se plasma el proceso de cada escenario propuesto en
cada una de las acciones Blue team. Red team como también los aspectos legales
consignando,
Los
aspectos relevantes del desarrollo de las actividades
relacionadas con el seminario especialización en Seguridad Informática, equipos
estratégicos en ciberseguridad Red Team & BlueTeam, exponiendo la seguridad de
la empresa The Whitehouse Security.
En el desarrollo de las actividades encomendadas por la empresa WHITEHOUSE
SECURITY con el fin de llevar a cabo el reclutamiento del personal se desarrollaron
actividades con el fin de analizar y desarrollar los siguientes informes: Etapa 1
Conceptos equipos de Seguridad, Etapa 2 - Actuación ética y legal, Etapa 3
Ejecución pruebas de intrusión y Etapa 4-Contención de ataques informáticos.This technical report reflects the process of each scenario proposed in
each of the Blue team actions. Red team as well as the legal aspects
consigning,
The
relevant aspects of the development of activities
related to the seminar specializing in Computer Security, computers
strategies in cybersecurity Red Team & BlueTeam, exposing the security of
The Whitehouse Security Company.
In the development of the activities entrusted by the company WHITEHOUSE
SECURITY in order to carry out the recruitment of personnel were developed
activities in order to analyze and develop the following reports: Stage 1
Safety team concepts, Stage 2 - Ethical and legal action, Stage 3
Execution of intrusion tests and Stage 4-Containment of computer attacks
Guest Editors’ Introduction-Special Issue on Digital Society and E-Technologies
It is evident that E-Technology (i.e. The Internet, social media… etc.) play a significant role in maintaining and supporting our digital society in various sectors from business, education, health and government and others. E-Technologies are now available worldwide for numerous numbers of universal users to increase collaboration, communication, interaction, creativity, critical thinking and problem solving in developing and developed countries. It is anticipated, and there is evidence gathering that E-technologies use will increase work performance, productivity, innovation, workers’ satisfaction, reduce cost and maintenance. On the other hand, adopting e-technologies will bring various negative aspects in relation to security, privacy, legal aspects and users’ frustration, as majorities of these e-technologies are still neglecting important aspects, i.e. Human Computer Interaction and usability. It is anticipated that these aspects will assist to improve the system functionality, which can be used efficiently, effectively and satisfactorily by universal users, including people with disability
- …