Professional Documents
Culture Documents
Khalid Al-Shalfan
.1
.2
.3
.4
.5
.6
.7
.8
.9
.10
Cyberspace
.
. Insider Criminals
.Outsider Criminal
Cyber
:Crime
.
:
". "Computer crimes
". "Computer abuse
"."Computer fraud
unauthorized success of computer
systems
()
.
%80
:
.
()
.
.
.
.
(
).
Provider
Victim
Offender
Saudi
Arabia
()
.
.
.
:
.
()
()
Information Brokers
.
((Distributed Denial of DDos
Service
) )
() ( )
()
(.)worms
.
( )
( ) .
.
.
.
()
.
.
.
.
Information
Security
Information: Asset of
knowledge obtained from
different data sources
Security : Foredoom
from danger & fear
Fact
:
Information Security is a process not a point product
.
.
.
.
()
. IP
.
.
.
The responsibly of
IT Security
.
.
.
Privates
Governments
Supervised
.
.
.
ID 'swipe' cards
.
.
ISP
:
.
.
.
.
.
Combating
Cyber Crime
Law
Enforcement
(Cyber Crime Unit)
Adjudication
Qualifying
The Unit
Unit Instillation
Legislation
Legislation
Process
Planning
Problem
Understanding
Japanese Model
Osaka
Sendai
Fukuoka
Saitama
Takamatsu
Tokyo
(Cyber Force Center)
Nagoya
Japanese Model
NPA Organization Chart
Info-Communications
Bureau
Commissioner General
Deputy Commissioner General
8 Regional Bureaus
High-tech Crime
Technology Division
Regional Offices
Dammam
Jedah
Riyadh
Cyber Crime Unit (Center)
Pubic Security
Forensic Security
Forensic Dep.
Cyber Crime Unit
private Dep.
Regional Offices
.
.
.
.
( )Auditing System
( )
()CERT
.1 (1995) , , , 2 .
7 : .69:
.2 , , ,
2002.
.3 (1414)
.4-2
.4 , ( 1420) , , .11304
.5 , ( 1420) , ,
.
ttp://www.cybercrime.gov .6
http://securityfocus.com .7
.8 , ( 1421) , , .
S. McClure, J. Scambray and G. Kurtz (2001), Hacking .9
Exposed, 2nd Ed, Osborne/McGraw-Hill
http://www./infosec2002.html.10
Christopher M.E. Painter (2001), USA Bulletin, March.11
http://www.vnunet.com/News/.12
Q&A
Website defacement