Cyber Crime Workshop - PowerPoint PPT Presentation

1 / 8
About This Presentation
Title:

Cyber Crime Workshop

Description:

Institute for Systems, Informatics, and Safety (ISIS) ... User Forum March 2001 (Banking, Telecomms, Law Enforcement, ISPs & Consumers) ... – PowerPoint PPT presentation

Number of Views:71
Avg rating:3.0/5.0
Slides: 9
Provided by: lotharbre
Category:

less

Transcript and Presenter's Notes

Title: Cyber Crime Workshop


1
Cyber Crime Workshop
  • Cyber Abuse Forum
  • Exploratory study into cyber abuse crime in
    E-Business.
  • Project for 2001, Started - December 2000

Cyber Crime Workshop, Seville, 11-12 January 2001
European Commission Joint Research
Centre Institute for Systems, Informatics, and
Safety (ISIS) Reliable Information Technologies
Information Dependability Robin Urry, Ispra,
Italy Tel 0039 0332 789263 email
robin.urry_at_jrc.it
2
Research Network of Institutions
  • Initial group of Six Research Institutions
    working collectively on joint developments.
  • UK Defence Evaluation Research Agency
  • Fraunhofer IAO
  • St Andrews University
  • Namur University
  • Institut Universitaire European
  • Joint Research Centre

3
CAF Objectives
  • Exploratory study to better understand issues of
    fraud prevention in e-business
  • Evidence requirements and impacts on the Forensic
    Process
  • Investigation Hierarchy
  • Enforcement Models
  • Prevention Models
  • Role of Open Source Software
  • Privacy Needs
  • C2B and B2B Transaction models
  • OUTPUT
  • RD projects (e.g. IST programme)
  • Longer-term research network in support of EU
    policy making

4
CAF Added Value
  • Policy Makers
  • Internet Users - Consumers, SMEs Corporate
  • Law Enforcement
  • Trust Marks
  • ADR
  • IT Security

5
CAF Approach
  • User Forum March 2001 (Banking, Telecomms, Law
    Enforcement, ISPs Consumers)
  • Reference Models, IT Tools Procedures base
    lining
  • Participation in Network or Forums
  • Intermediate report one day workshop
  • Privacy Confidence perspectives

6
Framework
Privacy
Prevention
Detection
Tools
Protection
Confidentiality
Evidence
Legality
7
Operations model
Prevention
Risk Assessment
Threat analysis
Detection of Irregularities
Evidence Search Identification
ADR
Criminal Investigation
Prosecution
8
Cyber Abuse - Escalation Model
Write a Comment
User Comments (0)
About PowerShow.com