Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien
logo-home
Summary Notes of the classes of Selected issues: cybercrime, technology and surveillance 15,99 €   Ajouter au panier

Resume

Summary Notes of the classes of Selected issues: cybercrime, technology and surveillance

1 vérifier
 92 vues  10 fois vendu
  • Cours
  • Établissement

These are notes of all the classes of CCTS, guest lectures included. There are a lot of pictures in the powerpoint that are not always included in the document so study with the powerpoints as well. English is not my first language so there are some spelling or grammar mistakes and sometimes an ex...

[Montrer plus]

Aperçu 4 sur 84  pages

  • 12 mai 2024
  • 84
  • 2023/2024
  • Resume

1  vérifier

review-writer-avatar

Par: yannickivens • 5 mois de cela

avatar-seller
CYBERCRIME
INTRODUCTION

Pwp introduction with information about the paper and the oral exam.

MODULE 1: CYBERCRIME: ACTS, ACTORS AND CHALLENGES

Brainstorm

DEFINITION

Cybersecurity Strategy of the European Union: An open, safe and secure
cyberspace JOIN(2013)1 final: Cybercrime commonly refers to a broad range of
different criminal activities where computers and information systems are involved
either as a primary tool or as a primary target ()

Europol IOCTA: divide cybercrime in 2 types

 Cyber facilitated: computers are used to commit a crime
 Cyber-dependent crimes: without technologies, it is not possible to
commit a crime

Variety of classifications




1

,CHARACTERISTICS OF CYBERCRIME

Difference between offline and cybercrime

1. Scale: you can target more people

2. Accessibility: technology is accessible

3. Anonymity: you can hide behind the screen (challenging for law enforcement) but not totally
anonymous

4. portability & transferability (vb use of cloud services, volatility of data/ servers)

5. global reach (offline: mostly in 1 place)

ACTS

 Hacking
 Sextortion
 Phishing
 Cyber attacks
o Malware attacks (see graphics)
 Fraud
o Ex. Donate to charity
 Online child sexual exploitation
 Social engineering
 Impersonation
 Threat landscape report (ENISA)
 Ransomware: they block information and ask money in return to deblock




2

,  Cross-cutting crime factors are those which impact, facilitate or otherwise contribute to
multiple crime areas but are not necessarily inherently criminal themselves.
 Grey infrastructure: legitimate tools & techniques that are abused by cybercriminals

ACTORS

 State-nexus threat groups: Groups closely linked to states
 Cybercriminals: online fraud for financial gain
 Hackers for hire
 Hacktivists: politically motivated actors
 Insiders: people on the inside of the company of the government who help the hackers
 Victims

See table 1 pwp module 2:

 Individuals and small criminal groups
 Insiders
 Organized criminal groups
 State and state-affiliated agents
 Hacktivists
 Cyberterrorists
 Script kiddies

CHALLENGES


Evolving threat landscape & expertise gap
which threats and how to tackle them

Criminalisation of offences
which offences, how to define them, etc.

Jurisdiction
who is competent to investigate and prosecute

Procedural law & investigations
e-evidence & loss of data, cross-border access to data, anonymity of perpetrators

International cooperation
how can cooperation between LEA in different countries be facilitated

Role of intermediaries
what is the role of private actors, for instance regarding subscriber data, handing over evidence, removing illegal
content, etc.?
Assistance to victims
how can victims be encouraged to report crimes, how can they be assisted in the aftermath

Education, training and awareness
how can awareness and knowledge of citizens be improved




3

, MODULE 2. CYBERCRIME: POLICY AND LEGISLATION

what kind of acts should be criminalized?
Which acts are adopted in criminal
legislation in national level?

We see the acts on European level but to
implement it you need to look at the
national level.

Also acts for private actors

Left side: overview of the instruments of
the level of the council of Europe.

Right side: overview of the instruments of the level of the EU

 Fragmented landscape: you need to look in different legislatives instruments to find the
correct legislative

(1) COUNCIL OF EUROPE: CYBERCRIME CONVENTION (BUDAPEST CONVENTION)

Adoption: 23 November 2001, Budapest

 Although the convention is old it is still relevant.
o It is future-proof, neutral technology definition.
 Council of Europe made this an important issue so member states could use this as
inspiration to make their own legislation.
 Member states of the convention on cybercrime: it is not only the members of the council of
Europe who participate but also other states -> 68 countries ratified. 50 countries signed but
not ratified.
o From the beginning it was clear to make the convention open for other countries,
this resulted in the presence of the USA and Japan during the negotiations. Also after
the convention was adopted the goal was to harmonies and make international
cooperation. So a lot of countries need to ratify to adopt the goal.
 Provision stays abstract and general so they are sometimes implemented in a different way
in different countries but it still harmonies;


3 PILLARS

 Harmonizing domestic criminal substantive elements of offenses
o Establishing a common minimum standard for relevant offenses
 Which offences do the members need to implement in their national law
 Important: easier to cooperate, and exchange information, preventing
perpetrators from locating themselves in countries where there is no
legislation (forum-shopping), double criminality
o Prevent abuses from being shifted to a Party with a previously lower standard


4

Les avantages d'acheter des résumés chez Stuvia:

Qualité garantie par les avis des clients

Qualité garantie par les avis des clients

Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.

L’achat facile et rapide

L’achat facile et rapide

Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.

Focus sur l’essentiel

Focus sur l’essentiel

Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.

Foire aux questions

Qu'est-ce que j'obtiens en achetant ce document ?

Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.

Garantie de remboursement : comment ça marche ?

Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.

Auprès de qui est-ce que j'achète ce résumé ?

Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur rechtenstudent007. Stuvia facilite les paiements au vendeur.

Est-ce que j'aurai un abonnement?

Non, vous n'achetez ce résumé que pour 15,99 €. Vous n'êtes lié à rien après votre achat.

Peut-on faire confiance à Stuvia ?

4.6 étoiles sur Google & Trustpilot (+1000 avis)

78140 résumés ont été vendus ces 30 derniers jours

Fondée en 2010, la référence pour acheter des résumés depuis déjà 14 ans

Commencez à vendre!
15,99 €  10x  vendu
  • (1)
  Ajouter