Science topics: LawCivil LawCyber Law
Science topic

Cyber Law - Science topic

Explore the latest questions and answers in Cyber Law, and find Cyber Law experts.
Questions related to Cyber Law
  • asked a question related to Cyber Law
Question
5 answers
Are there any law regulating cybersecurity in medical devices?
Relevant answer
Answer
In Poland it could be a pure hacking and additionaly it might be qualified as causing direct danger to health or life. Besides, data protection regulations may be applied.
  • asked a question related to Cyber Law
Question
5 answers
dear all
I am looking for on literature in Cyber Crime against children.
Relevant answer
Answer
Please see the RG link below.
  • asked a question related to Cyber Law
Question
11 answers
recent hot area of research in the field of cyber forensics
Relevant answer
Answer
Below I briefly described the issues related to cybercrime and cybersecurity, which I researched and described in scientific publications that are available on the Research Gate portal. Over the past few years, the scale of cybercrime attacks on the IT systems of various institutions, including government institutions, on the databases of social media portals, on the ICT systems of banks, on electronic banking systems has been growing. Cybercriminals are increasingly attacking mobile online banking systems made available to Internet users and bank customers through mobile devices, mainly via smartphones. Research shows that the scale of cybercrime attacks on the IT systems of banks, institutions, etc. using social engineering combined with perfidiously created malicious software such as ransomware, i.e. encrypting access to data on disks or redirecting users to fake websites of banks and institutions on the Internet to phishing personal data, access passwords to electronic banking accounts and, as a result, to steal money. For several years, many mailbox users have appeared strange emails of unknown origin, which are sent as spam from private other email accounts or others with false information. Attachments containing false information are attached to many of these suspicious emails, usually sent by cybercriminals and hackers. Attachments are usually of the WORD * .doc document type, the Acrobat Reader * .pdf format, image files or other formats, and often contain Ransomware-type viruses. These are very dangerous viruses that encrypt access to a computer's disk. In addition, cyber criminals are increasingly using mailboxes set up on the e-mail portal to send infected e-mails to subsequent Internet users by generating fake emails so that they look like a specific user of the mailbox would send e-mails prepared by cybercriminals to their friends. These types of cybercrime techniques are becoming more common. Why are Internet technology companies that dominate the market and offer e-mail services do not improve the security of e-mail communication systems using e-mail boxes to significantly reduce cybercriminals' activity harmful to citizens? This question is still valid. On the other hand, internet banks and technology internet companies, technology fintechs are constantly improving cyber security techniques. The development of Business Intelligence business intelligence, Blockchain technology, data analysis in Big Data database systems, artificial intelligence to track movements and attacks made by cybercriminals, for prognostic analyzes, etc. can be helpful in the process of improving IT systems risk management. Therefore, the skilful and efficient use of data science technology can be helpful in combating cybercrime, but it all depends on how these technologies will be used and, as a consequence, who will win in the following years in this IT, information "arms race". I conduct research in this area. Conclusions from the research I published in scientific publications that are available on the Research Gate website. I invite you to scientific cooperation.
Greetings,
Dariusz Prokopowicz
  • asked a question related to Cyber Law
Question
11 answers
What criteria should we use when evaluating the severity of propaganda? What forms of national defense exist to guard against weaponized information? Is disinformation a human rights abuse?
Relevant answer
Answer
In my opinion, propaganda and information warfare involve at some point or another the efforts of a non-democratic regime to undermine a democracy or an equally non-democratic regime. Groups can also engage in propaganda campaigns. Counter-propaganda involves factual information combined with propaganda arguments: see the US versus ”red” propaganda during the Cold War via Radio Liberty/Radio Free Europe. Propaganda evolves into information warfare depending on the scale and ideological stakes of the clash between democracy and its enemies: individuals, groups or states.
  • asked a question related to Cyber Law
Question
4 answers
how can one acquire the relevant data in cloud to carry out forensics in cloud without disturbing others data , as cloud is the common place for storing the data, and also can any one suggest me the unique tool which is used for this purpose.
Relevant answer
Answer
Hi Shaik
If you are looking to collect real forensic data without upsetting others, why don't you set up a honeypot server? This way, you will attract a huge amount of potential attacks, and you will be able to analyse what is happening, or has happened. There are quite a number of these available to use. You can either set them up as standalone systems, or you can use one to run on the cloud. There is a good startup from around three years ago who specialise in providing a honeypot server, which has its own toolsets to track and monitor what is happening, and will allow you to amass a good deal of useful data to help you with your quest. It is Open Source, so the only cost will be the cost of your cloud instance. It is called Modern-Honey-Network, and I have included a link to their website plus a tutorial on how to set one up in Amazon EC2.
This way, you get to collect plenty of good data, and you are not likely to impact on anyone else. Besides, very few companies are willing to share forensic data resulting from a security breach or a breach attempt, so this will give you the opportunity to collect real forensic data.
Good luck with your project.
Regards
Bob
  • asked a question related to Cyber Law
Question
5 answers
I would especially be interested in how the crime rate is affected by the rentention of telecommunication data?
Relevant answer
Answer
The title of the book is 'The Dutch implementation of the data retention directive. On the storage and use of telephone and internet traffic data for crime investigation purposes'.
  • asked a question related to Cyber Law
Question
4 answers
Data is fuel for for this digital economy and considered as an asset. It should be protected and needs proper legal frame work, specifically under cloud computing. What is your opinion?
Relevant answer
Answer
with legal aspects the Countries need to reach a consensus as to the technical requirements and industry standards in hardware, software, internet protocols and related technologies that are most critical to law enforcement needs.