SlideShare a Scribd company logo
1
2
• The use of computing resources to intimidate,
coerce or harm people, places or systems we
depend upon.
• Amalgamation of Cyberspace and Terrorism.
• Leveraging of a target's computers and
information technology, particularly via the
Internet, to cause physical, real-world harm or
severe disruption with the aim of advancing the
attacker's own political or religious goals.
3
4
Why would a terrorist decide to use the
Internet, rather than using the usual methods
of assassination, hostage taking and guerrilla
warfare?
5
• Chances of capture, injury, or death to a
cyber terrorist are less
• Cyber terrorism is difficult to track
• Easy to accomplish due to lack of
understanding of security risks
But, in one of its more unusual forms,
cyber-terrorism can be related with
physical, real world terrorism.
6
7
• Crackers -A cracker is someone who breaks
into someone else's computer system, often on
a network; bypasses passwords or licenses in
computer programs; or in other ways
intentionally breaches computer security.
• White Hat Hackers – Hackers who break into
computers. They have no right to access but
they often report the security leaks to the
victims.
• Script bunnies - People who would like to be
hackers but don’t have much technical
expertise. They download click-and-point
software that automatically does the hacking for
them. 8
9
10
• Dependence on Network Infrastructure
and the Internet
• Lack of Understanding of Security Risks
• Lack of Funding for Adequate Network
Security Tools
• Difficulty in tracking the Cyber terrorist
11
12
• Information Gathering Purposes
• Prank
• National pride
• Financial gains
• Hatred
13
14
• Information theft
Minor attacks come in the form of "data diddling", where
information in the computer is changed. This may involve changing
medical or financial records or stealing of passwords. Hackers may
even prevent users who should have access from gaining access to
the machine.
Ethical issues in this case include things like invasion of privacy and
ownership conflicts.
• Credit Card Number Theft
People are using credit cards for more and more of their
purchases as time goes on.. Credit cards are especially easy to use
fraudulently, because they require no extra identification number to
use.
All that a thief needs is pure information-they don't need the card,
but just the number on the card. Recently, with people spending
more on purchases transacted over the internet, credit card fraud is
becoming easier.
More than 40 million credit card numbers belonging to U.S.
consumers were accessed by a computer hacker in the year 2005
according to MasterCard International Inc.
15
• Electronic Cash
We are already well on the way to a cash-free society. People now
use ATM cards, credit cards, and check-cards for a large
percentage of their purchasing. As we move further from a paper-
money society, to a purely electronic economy, new types of crime
will emerge as accessing these is quite easier.
All we can be sure of, is that criminals of tomorrow, like those of last
century and those of today, will keep on innovating.
This is because, as a system advances, so does the criminals.
• Hacking
Hacking is basically knowing programmable systems and how they
work.
How can hacking be helpful ?
Some agencies hire hackers to show them the downfalls in their
security system so they can improve it against hackers that want
information or access into the computer for other reasons.
Hacking is a form of art for some people .
But generally , it is being used adversely.
One of the popular terror act is to threaten a large bank. 16
17
• In 2001 ,12 billion dollars in losses due to security breaches, virus
attacks and hacked network
• The NIMDA virus alone accounted for 2 billion dollars in losses
• The Mydoom virus sent 100 million infected e-mails in the first 36
hours, and accounted for roughly a quarter of global e-mail traffic on
Jan. 26, 2004.
• The pessimists claim that cyber attacks cost $10-$15 billion per year
and would cost tens of billions more to fix, the optimists claim that all
cyber crime over a five year period cumulatively cost only $1 billion
and fixing the current vulnerabilities would only cost $4-$5 billion
more.
As the Cyberspace continues to expand, and systems
continue to be assigned more responsibility while
becoming more and more complex and interdependent,
sabotage or terrorism via cyberspace may become a
more serious threat.
18
19
• Cooperate and share intelligence among
all agencies.
• The tools of a counter-Cyber Terrorist
team must be real-time and dynamic, as
the weapons will continually change.
• Make building, network and desktop
security a priority.
• Report instances of cyber crime to local
law enforcement agencies.
20
21
Building/Office Security
• Use of secure entrances – card keys, biometric
entry devices
• Personnel should question why non-staff are in
the building
• Security personnel
• Standard operating procedures in cases of
dismissal or reprimand
• Background checks on contracted service
personnel looking for a past history of theft, drug
use or sale, assault, computer crime
22
Desktop/Laptop Computer
Security
• Virus detection software that is regularly updated
• Secure physical set-up that is not open to the
public or unmonitored
• Passworded screen savers
• Require network logins if you are on a network
• Standardize the desktop so as to limit what an
end-user can and cannot do
23
Server Security
• The server should be kept in a locked and
restricted area
• Administrative passwords and equivalencies
should be given to a minimal number of people
• Administrative passwords should be changed
regularly
• Users should only be given access to file
systems that they will actually need to use
• Virus detection software that is regularly updated
24
Network Security
• Require logins and passwords
• Users should be required to change passwords
at least every 30 days
• The passwords should be easy enough to
remember and difficult enough to guess
• Use of Firewalls and Routers
• Standard Operating procedures when an
employee leaves, is terminated or is given
formal reprimands
25
• Disable unused accounts
• Require users to log-out and login each day
• Encrypt all traffic over the LAN
26
27
• Cyber forensics is a newly emerged and
developing field, which can be described as the
study of digital evidence resulting from an
incident.
• It involves collection and analysis of digital data
within an investigative process. Cyber forensics
involves the investigation and analysis of a
computer to determine the potential of legal
evidence
28
29
• To prevent cyber stalking avoid disclosing any
information pertaining to oneself. This is as good
as disclosing your identity to strangers in public
place.
• Always avoid sending any photograph online
particularly to strangers and chat friends as
there have been incidents of misuse of the
photographs.
• Never send your credit card number to any site
that is not secured, to guard against frauds.
• Always keep a watch on the sites that your
children are accessing to prevent any kind of
harassment or depravation in children.
• Use of firewalls may be beneficial.
30
31
• Provide for Contingencies if Critical
Systems and Networks are Unavailable or
Damaged
– Determine alternate ways of processing data
– Determine dependencies between systems
and equipment
– Determine backup personnel
• The plan should be current and known
32
33
• BEST BOOKS:-
• >Hacking exposed by Stuart McClure
• >Unofficial guide to ethical hacking by Ankit Fadia
• >Google Hacks by Calishain & Cornets
• BEST WEBSITES:-
• >www.google.com
• >www.securityfocus.com
• >www.darkangel.pro.tcq
• http://www.cybercrimelaw.org/index.cfm - Cybercrime
Law
• http://www.rbs2.com/ccrime.htm#anchor666666 -
Computer Crimes, Ronald B. Standler
34
35

More Related Content

What's hot

cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
Jacqueline Fick
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
tangytangling
 

What's hot (20)

Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
How to become Hackers .
How to become Hackers .How to become Hackers .
How to become Hackers .
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Hacking
Hacking Hacking
Hacking
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 

Similar to Cyberterrorism

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 

Similar to Cyberterrorism (20)

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 

Recently uploaded

Recently uploaded (20)

Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
Extraction Of Natural Dye From Beetroot (Beta Vulgaris) And Preparation Of He...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 

Cyberterrorism

  • 1. 1
  • 2. 2
  • 3. • The use of computing resources to intimidate, coerce or harm people, places or systems we depend upon. • Amalgamation of Cyberspace and Terrorism. • Leveraging of a target's computers and information technology, particularly via the Internet, to cause physical, real-world harm or severe disruption with the aim of advancing the attacker's own political or religious goals. 3
  • 4. 4
  • 5. Why would a terrorist decide to use the Internet, rather than using the usual methods of assassination, hostage taking and guerrilla warfare? 5
  • 6. • Chances of capture, injury, or death to a cyber terrorist are less • Cyber terrorism is difficult to track • Easy to accomplish due to lack of understanding of security risks But, in one of its more unusual forms, cyber-terrorism can be related with physical, real world terrorism. 6
  • 7. 7
  • 8. • Crackers -A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. • White Hat Hackers – Hackers who break into computers. They have no right to access but they often report the security leaks to the victims. • Script bunnies - People who would like to be hackers but don’t have much technical expertise. They download click-and-point software that automatically does the hacking for them. 8
  • 9. 9
  • 10. 10
  • 11. • Dependence on Network Infrastructure and the Internet • Lack of Understanding of Security Risks • Lack of Funding for Adequate Network Security Tools • Difficulty in tracking the Cyber terrorist 11
  • 12. 12
  • 13. • Information Gathering Purposes • Prank • National pride • Financial gains • Hatred 13
  • 14. 14
  • 15. • Information theft Minor attacks come in the form of "data diddling", where information in the computer is changed. This may involve changing medical or financial records or stealing of passwords. Hackers may even prevent users who should have access from gaining access to the machine. Ethical issues in this case include things like invasion of privacy and ownership conflicts. • Credit Card Number Theft People are using credit cards for more and more of their purchases as time goes on.. Credit cards are especially easy to use fraudulently, because they require no extra identification number to use. All that a thief needs is pure information-they don't need the card, but just the number on the card. Recently, with people spending more on purchases transacted over the internet, credit card fraud is becoming easier. More than 40 million credit card numbers belonging to U.S. consumers were accessed by a computer hacker in the year 2005 according to MasterCard International Inc. 15
  • 16. • Electronic Cash We are already well on the way to a cash-free society. People now use ATM cards, credit cards, and check-cards for a large percentage of their purchasing. As we move further from a paper- money society, to a purely electronic economy, new types of crime will emerge as accessing these is quite easier. All we can be sure of, is that criminals of tomorrow, like those of last century and those of today, will keep on innovating. This is because, as a system advances, so does the criminals. • Hacking Hacking is basically knowing programmable systems and how they work. How can hacking be helpful ? Some agencies hire hackers to show them the downfalls in their security system so they can improve it against hackers that want information or access into the computer for other reasons. Hacking is a form of art for some people . But generally , it is being used adversely. One of the popular terror act is to threaten a large bank. 16
  • 17. 17
  • 18. • In 2001 ,12 billion dollars in losses due to security breaches, virus attacks and hacked network • The NIMDA virus alone accounted for 2 billion dollars in losses • The Mydoom virus sent 100 million infected e-mails in the first 36 hours, and accounted for roughly a quarter of global e-mail traffic on Jan. 26, 2004. • The pessimists claim that cyber attacks cost $10-$15 billion per year and would cost tens of billions more to fix, the optimists claim that all cyber crime over a five year period cumulatively cost only $1 billion and fixing the current vulnerabilities would only cost $4-$5 billion more. As the Cyberspace continues to expand, and systems continue to be assigned more responsibility while becoming more and more complex and interdependent, sabotage or terrorism via cyberspace may become a more serious threat. 18
  • 19. 19
  • 20. • Cooperate and share intelligence among all agencies. • The tools of a counter-Cyber Terrorist team must be real-time and dynamic, as the weapons will continually change. • Make building, network and desktop security a priority. • Report instances of cyber crime to local law enforcement agencies. 20
  • 21. 21
  • 22. Building/Office Security • Use of secure entrances – card keys, biometric entry devices • Personnel should question why non-staff are in the building • Security personnel • Standard operating procedures in cases of dismissal or reprimand • Background checks on contracted service personnel looking for a past history of theft, drug use or sale, assault, computer crime 22
  • 23. Desktop/Laptop Computer Security • Virus detection software that is regularly updated • Secure physical set-up that is not open to the public or unmonitored • Passworded screen savers • Require network logins if you are on a network • Standardize the desktop so as to limit what an end-user can and cannot do 23
  • 24. Server Security • The server should be kept in a locked and restricted area • Administrative passwords and equivalencies should be given to a minimal number of people • Administrative passwords should be changed regularly • Users should only be given access to file systems that they will actually need to use • Virus detection software that is regularly updated 24
  • 25. Network Security • Require logins and passwords • Users should be required to change passwords at least every 30 days • The passwords should be easy enough to remember and difficult enough to guess • Use of Firewalls and Routers • Standard Operating procedures when an employee leaves, is terminated or is given formal reprimands 25
  • 26. • Disable unused accounts • Require users to log-out and login each day • Encrypt all traffic over the LAN 26
  • 27. 27
  • 28. • Cyber forensics is a newly emerged and developing field, which can be described as the study of digital evidence resulting from an incident. • It involves collection and analysis of digital data within an investigative process. Cyber forensics involves the investigation and analysis of a computer to determine the potential of legal evidence 28
  • 29. 29
  • 30. • To prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place. • Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs. • Never send your credit card number to any site that is not secured, to guard against frauds. • Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children. • Use of firewalls may be beneficial. 30
  • 31. 31
  • 32. • Provide for Contingencies if Critical Systems and Networks are Unavailable or Damaged – Determine alternate ways of processing data – Determine dependencies between systems and equipment – Determine backup personnel • The plan should be current and known 32
  • 33. 33
  • 34. • BEST BOOKS:- • >Hacking exposed by Stuart McClure • >Unofficial guide to ethical hacking by Ankit Fadia • >Google Hacks by Calishain & Cornets • BEST WEBSITES:- • >www.google.com • >www.securityfocus.com • >www.darkangel.pro.tcq • http://www.cybercrimelaw.org/index.cfm - Cybercrime Law • http://www.rbs2.com/ccrime.htm#anchor666666 - Computer Crimes, Ronald B. Standler 34
  • 35. 35