This HTML5 document contains 132 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n10http://www.ojp.usdoj.gov/nij/topics/technology/electronic-crime/
dctermshttp://purl.org/dc/terms/
n9http://www.ic3.gov/
n20http://www.ustreas.gov/usss/
n21http://www.atf.gov/contact/field/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n11https://www.fbi.gov/cyberinvest/
n6http://www.cybercrime.gov/
n15https://link.springer.com/chapter/
n5https://global.dbpedia.org/id/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
dbpedia-srhttp://sr.dbpedia.org/resource/
n22http://
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbphttp://dbpedia.org/property/
provhttp://www.w3.org/ns/prov#
dbchttp://dbpedia.org/resource/Category:
xsdhhttp://www.w3.org/2001/XMLSchema#
n23http://www.us-cert.gov/
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Computer_crime_countermeasures
rdfs:label
Computer crime countermeasures
rdfs:comment
Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, identity theft, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
dcterms:subject
dbc:Cybercrime
dbo:wikiPageID
31469655
dbo:wikiPageRevisionID
1122080603
dbo:wikiPageWikiLink
dbr:Cyberwarfare dbr:Internet_Protocol_Security dbr:Privacy dbr:Adware dbr:Access_Control_Lists dbr:Secure_Sockets_Layer dbr:Social_engineering_(security) dbr:IP_spoofing dbr:Multimedia dbr:Terrorist_threat dbr:Layer_2_Tunneling_Protocol dbr:Computer_viruses dbr:Biometric dbr:Public_goods dbr:Data_Encryption_Standard dbr:Iris_scan dbr:Botnet dbr:SYN_flood dbr:Electronic_Communications_Privacy_Act dbr:Stored_Communications_Act dbr:CAN-SPAM_Act dbr:Distributed_Denial_of_Service dbr:Cyber_security_and_countermeasure dbr:Cyber_warfare dbr:Prisoner’s_dilemma dbr:Internet dbr:Transport_Layer_Security dbr:Triple_DES dbr:Internet_kill_switch dbr:Countermeasure dbr:Confidential dbr:Digital_Millennium_Copyright_Act dbr:Keyloggers dbr:Cryptography dbr:Internet_Spyware_Prevention_Act dbr:Gramm-Leach-Bliley_Act dbr:Rootkits dbr:US_Patriot_Act dbr:Advanced_Encryption_Standard dbr:CERT_Coordination_Center dbr:Common_Vulnerabilities_and_Exposures dbr:Bureau_of_Alcohol_Tobacco_and_Firearms dbr:Common_Vulnerability_Scoring_System dbr:Penetration_test dbr:Bastion_host dbr:Denial_of_Service dbr:Interpol dbr:Malicious_code dbr:Malware dbr:Countermeasures dbr:Patch_(computing) dbr:Service_packs dbr:Man-in-the-middle_attack dbr:Popup_ads dbr:International_Criminal_Court dbr:Copyright_infringement dbr:Vulnerability_(computing) dbr:Psychological_manipulation dbr:Child_grooming dbr:Hypothetical dbr:Hotfixes dbr:Spyware dbr:Digital_Rights_Management dbr:Computer_worm dbr:Internet_service_provider dbr:Firewall_(computing) dbr:Computer_emergency_response_team dbr:Market_failure dbc:Cybercrime dbr:Point-to-Point_Tunneling_Protocol dbr:Antivirus dbr:Antivirus_software dbr:Virtual_Private_Network dbr:Computer_security dbr:United_States_Computer_Emergency_Readiness_Team dbr:Federal_Communications_Commission dbr:Biometrics dbr:Computer_Fraud_and_Abuse_Act dbr:Credit_bureaus dbr:Social_network_analysis dbr:Phishing dbr:Computer_network dbr:Identity_theft dbr:Security_hacker dbr:Bank dbr:Externality dbr:Federal_Trade_Commission dbr:Carnegie_Mellon_University dbr:Acceptable_use_policy dbr:Packet_sniffing dbr:Hacker_(computer_security) dbr:Wire_fraud dbr:Fingerprint_authentication dbr:Information_security dbr:Trojan_horse_(computing) dbr:Terrorist dbr:Voice_identification dbr:E-mail_spam dbr:End-user_license_agreement dbr:Internet_Protocol dbr:United_States_Department_of_Justice dbr:Unsolicited_advertisement dbr:Federal_Bureau_of_Investigation dbr:Network_monitoring dbr:Espionage dbr:Computer dbr:Child_pornography
dbo:wikiPageExternalLink
n6: n9:default.aspx n10:welcome.htm n11:cyberhome.htm n15:10.1007%2F978-3-319-03692-2_18 n20:financial_crimes.shtml%23Computer n21: n22:www.cert.org n23:
owl:sameAs
n5:4igoe dbpedia-sr:Tipovi_kriminala_na_internetu wikidata:Q5197765
dbp:wikiPageUsesTemplate
dbt:Columns-list dbt:Reflist dbt:Globalize dbt:Short_description
dbo:abstract
Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, identity theft, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, and other cross-border attacks sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions, with the International Criminal Court among the few addressing this threat. A cyber countermeasure is defined as an action, process, technology, device, or system that serves to prevent or mitigate the effects of a cyber attack against a victim, computer, server, network or associated device. Recently there has been an increase in the number of international cyber attacks. In 2013 there was a 91% increase in targeted attack campaigns and a 62% increase in security breaches. A number of countermeasures exist that can be effectively implemented in order to combat cyber-crime and increase security.
prov:wasDerivedFrom
wikipedia-en:Computer_crime_countermeasures?oldid=1122080603&ns=0
dbo:wikiPageLength
29687
foaf:isPrimaryTopicOf
wikipedia-en:Computer_crime_countermeasures