摘要 :
Over the past decade computers and computer-based technologies have come to play an increasingly dominant role in processing and carrying out financial transactions. Accompanying this growth has been a concern, expressed both with...
展开
Over the past decade computers and computer-based technologies have come to play an increasingly dominant role in processing and carrying out financial transactions. Accompanying this growth has been a concern, expressed both within the law enforcement and financial communities, that increased reliance on electronic banking technologies--commonly referred to as 'electronic funds transfers' or EFT--may create the potential or opportunity for new types of criminal activity, in particular computer-related white collar crimes. However, there has been very little systematic analysis of the relationship between EFT and crime. The purpose of this report, then, is to examine the nature and extent of EFT-related crime. (Copyright (c) July 1982 Public Systems Evaluation, Inc.)
收起
摘要 :
As the criminal justice system is confronted with increasing levels of computer related crime, and as efforts increase to bring sophisticated felons to justice, the use of expert witnesses will represent an invaluable source of te...
展开
As the criminal justice system is confronted with increasing levels of computer related crime, and as efforts increase to bring sophisticated felons to justice, the use of expert witnesses will represent an invaluable source of technical assistance to investigators and prosecutors. This Manual attempts to examine many of the issues, factors and obstacles which may surface in the use of expert witnesses. Criminal justice personnel contemplating the use of an expert witness would be well advised to sensitize themselves to the issues raised within this document. (Copyright (c) 1980 by Koba Associates, Inc.)
收起
摘要 :
Two new books about intrusions and computer viruses remind us that attacks against our computers on networks are the actions of human beings. Cliff Stoll's book about the hacker who spent a year, beginning in Aug. 1986, attempting...
展开
Two new books about intrusions and computer viruses remind us that attacks against our computers on networks are the actions of human beings. Cliff Stoll's book about the hacker who spent a year, beginning in Aug. 1986, attempting to use the Lawrence Berkeley Computer as a stepping-stone for access to military secrets is a spy thriller that illustrates the weaknesses of our password systems and the difficulties in compiling evidence against a hacker engaged in espionage. Pamela Kane's book about viruses that attack IBM PC's shows that viruses are the modern version of the old problem of a Trojan horse attack. It discusses the most famous viruses and their countermeasures, and it comes with a floppy disk of utility programs that will disinfect your PC and thwart future attack.
收起
摘要 :
Among 198 businesses responding to a 2001 pilot survey, 74% reported being a victim of cybercrime. Other findings on the 198 businesses included the following: nearly two-thirds had been victimized by a computer virus at least onc...
展开
Among 198 businesses responding to a 2001 pilot survey, 74% reported being a victim of cybercrime. Other findings on the 198 businesses included the following: nearly two-thirds had been victimized by a computer virus at least once; a quarter had experienced denial of service attacks, such as the degradation of Internet connections due to excessive amounts of incoming information; about a fifth reported that their computer systems had been vandalized or sabotaged. These are some of the findings from the Computer Security Survey (CSS) 2001 pilot, which covered a group of 500 businesses nationwide. These findings are not nationally representative but illustrate the feasibility and utility of a data collection program to be initiated in 2004 among some 36,000 businesses.
收起
摘要 :
The Administration is focused on protecting the innovation that drives the American economy and supports jobs in the United States. As a Nation, we create products and services that improve the worlds ability to communicate, to le...
展开
The Administration is focused on protecting the innovation that drives the American economy and supports jobs in the United States. As a Nation, we create products and services that improve the worlds ability to communicate, to learn, to understand diverse cultures and beliefs, to be mobile, to live better and longer lives, to produce and consume energy efficiently and to secure food, nourishment and safety. Most of the value of this work is intangibleit lies in Americas entrepreneurial spirit, our creativity, ingenuity and insistence on progress and in creating a better life for our communities and for communities around the world. These intangible assets are often captured as intellectual propertycopyrights, patents, trademarks and trade secrets, and reflect Americas advantage in the global economy. Emerging trends indicate that the pace of economic espionage and trade secret theft against U.S. corporations is accelerating. There appears to be multiple vectors of attack for persons and governments seeking to steal trade secrets. Foreign competitors of U.S. corporations, some with ties to foreign governments, have increased their efforts to steal trade secret information through the recruitment of current or former employees. Additionally, there are indications that U.S. companies, law firms, academia, and financial institutions are experiencing cyber intrusion activity against electronic repositories containing trade secret information. Trade secret theft threatens American businesses, undermines national security, and places the security of the U.S. economy in jeopardy. These acts also diminish U.S. export prospects around the globe and put American jobs at risk.
收起
摘要 :
We perform a comprehensive measurement analysis of Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather and analyze data over eight mo...
展开
We perform a comprehensive measurement analysis of Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather and analyze data over eight months between the end of 2
收起
摘要 :
During the First Session of the 98th Congress, several days of hearings were held on the activities of computer enthusiasts including the Milwaukee 414s and others. The First Session also saw the introduction in the House of six b...
展开
During the First Session of the 98th Congress, several days of hearings were held on the activities of computer enthusiasts including the Milwaukee 414s and others. The First Session also saw the introduction in the House of six bills dealing with various aspects and computer crime. A summary of those hearings, along with a summary of the pending computer crime bills, will be presented. (ERA citation 09:019594)
收起
摘要 :
Presents the nature and prevalence of computer security incidents among 7,818 businesses in 2005. This is the first report to provide data on monetary loss and system downtime resulting from cyber incidents. It examines details on...
展开
Presents the nature and prevalence of computer security incidents among 7,818 businesses in 2005. This is the first report to provide data on monetary loss and system downtime resulting from cyber incidents. It examines details on types of offenders, reporting of incidents to law enforcement, reasons for not reporting incidents, types of systems affected, and the most common security vulnerabilities. The report also compares in-house security to outsourced security in terms of prevalence of cyber attacks.
收起