Digital Formalization and Russian Cyber Laws

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

"Information Troops" - A Russian Cyber Command?

Appraisals of Russian military performance during the armed conflict with Georgia in August 2008 noted, among other deficiencies, poor performance in Information Warfare (IW). This led to calls in informed commentary for the creation of dedicated “Information Troops” within the Russian armed forces, whose duties would include what we would define as cyber operations. This stemmed from a percept...

متن کامل

A Formalization of Digital Forensics

Forensic investigative procedures are used in the case of an intrusion into a networked computer system to detect the scope or nature of the attack. In many cases, the forensic procedures employed are constructed in an informal manner that can impede the effectiveness or integrity of the investigation. We propose a formal model for analyzing and constructing forensic procedures, showing the adv...

متن کامل

Digital Forensics and Cyber Crime Datamining

Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper propo...

متن کامل

Cyber Forensics and Admissibility of Digital Evidence

Cyber Forensics and Admissibility of Digital Evidence by Dr. Swati Mehta* Cite as: (2012) PL January S-23†Section 65-B of the Evidence Act deals with admissibility of electronic records as evidence in the court of law. The computer holding the original evidence does not need to be produced in court. A printout of the record or a copy on a CDROM, hard disk, floppy, etc. can be produced in the ...

متن کامل

Single and Double Power Laws for Cyber-Crimes

Eleven years of financial loss data from the CSI annual Computer Crime and Security surveys have been analysed to discover whether or not they obey some form of power law relationship. Evidence is adduced for the existence of both single and double power laws, and their characteristic exponents are determined, together with various statistical and probabilistic reliability measures. The finding...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: HELIX

سال: 2019

ISSN: 2277-3495,2319-5592

DOI: 10.29042/2019-5462-5464