Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Chapter

Download BibTeX

Title

Technical aspects of cybercrime

Authors

[ 1 ] Wydział Prawa i Administracji, Akademia Sztuki Wojennej | [ P ] employee

Scientific discipline (Law 2.0)

[6.7] Law

Year of publication

2025

Chapter type

chapter in monograph

Publication language

polish

Abstract

EN Chapter 1 provides a brief overview of the technical side of computer crime, i.e., the methods used by criminals who commit cybercrimes (commonly known as hackers). It presents the categories of computer attacks, preparatory activities preceding them (e.g., port scanning, enumeration) and the most important types of them: computer eavesdropping (sniffing, man-in-the-middle attack, session hijacking and electromagnetic wave analysis), methods of cracking passwords, spoofing, social engineering, phishing, pharming, exploiting vulnerabilities (buffer overflow, SQL Injection, XSS attacks), malware (malicious software – trojans, viruses, spyware, etc.), denial of service attacks (DoS), bluejacking and bluehacking.

Date of online publication

18.02.2025

URL

https://www.taylorfrancis.com/books/mono/10.4324/9781003476771/cybercrime-law-filip-radoniewicz

Comments

Rozdział 1: 26 s.

Book

Cybercrime and the Law : an Analysis of Legal Governance in Europe

Ministry points / chapter

50

Ministry points / chapter (humanities, social sciences and theology)

75