*Personal data

Please read each of the paragraphs carefully and select only one of the available options, by check one box.

Age:

☐ under 30 years old ☐ 30 - less than 40 ☐ 40 - less than 50 ☐ 50 years and over

Gender:

☐ Male ☐ Female

Marital status:

☐ Married ☐ Unmarried ☐ Absolute ☐ Widower

Educational level:

☐ High School ☐ Bachelor ☐ Master ☐ PhD

City: --------------------------------

Police Rank:

☐ Lieutenant ☐ First Lieutenant ☐ Captain ☐ Major ☐ Lieutenant-Colonel ☐ Colonel ☐ Brigadier General ☐ Other .............

Service length in years:

☐ Less than five years ☐ 5 - less than 10 ☐ 10 - less than 15

☐ 15 - less than 20 ☐ 20 years and over

Nature of the current job:

☐ Administrative ☐ Field ☐ Investigation ☐ Other .................

Investigate cyberspace issues:

☐ Did not investigate ☐ A case - less than five cases ☐ Five or more cases

The period of the training course on cybercrime per week:

☐ None ☐ Less than 5 weeks ☐ 5 - Less than 10 ☐ 10 or more weeks

Do you read print and electronic publications (cybercrime):

☐ Yes ☐ No

English reading proficiency:

☐ Yes ☐ No

Years computer use:

☐ None ☐ Less than 3 ☐ 3 - Less than 6

☐ 6 - less than 10 ☐ 10 or more

Computer hours using per week:

☐ None ☐ Less than 5 ☐ 5 - Less than 10

☐ 10 - less than 15 ☐ 15 - less than 20 ☐ 20 or more hours

Years of internet use:

☐ None ☐ Less than one year ☐ One year - less than three years

☐ Three years - less than four years ☐ years or more

Average weekly internet usage hours:

☐ None ☐ Less than 5 ☐ 5 - Less than 10

☐ 10 - less than 15 ☐ 15 - less than 20 ☐ 20 or more hours

*Checklist axes

s.

Cyber crime

Responses (knowledge score)

Excellent (5)

Very Good (4)

Good (3)

Poor (2)

Very Poor (1)

First axis: the level of familiarity with the tools and methods used in committing cybercrime

1

Computer virus

2

Trajan Hoarse

3

Password Crackers

4

Network Scanners

5

Email Flooders

6

Key Loggers

7

Packet Sniffers

8

IP Spoofing

9

War dialers

10

Credit Card Numbers Generators

11

Anonymity

12

Social Engineering

Second axis: level of awareness of some aspects related to cybercrime.

1

Some of the famous cases of these crimes.

2

Current reality of these crimes.

3

Categories of perpetrators of these crimes and the distinguishing characteristics of each category.

4

Future trends of these crimes.

5

On-line sources of information on these crimes.

6

Dimensions of international prosecution and joint cooperation to combat these crimes.

7

Legislation and laws relating to these crimes

Third axis: level of knowledge of cybercrime and the characteristics that distinguish each crime.

s.

Cyber crime

Responses (knowledge score)

Excellent (5)

Very Good (4)

Good (3)

Poor (2)

Very Poor (1)

1

Spreading Computer Viruses and Trojans

2

Denial of Service

3

Distributed Denial of Service

4

E-mail Hacking

5

E-mail Flooding

6

E-mail Forgery

7

Unauthorized use of devices and networks

8

Hacking devices, networks and websites

9

Computer data sabotage

10

Publishing information that violates laws and regulations

11

Data Theft

12

Software Piracy

13

Intercepting and eavesdrop on computer communications

14

Fraud and Embezzlement

15

Manipulation of telecommunications network systems

16

Online Gambling

17

Cyber-Laundering

18

Identity Theft

19

Cyber Espionage

20

Cyber Terrorism

Fourth axis: level of familiarity with some programs and tools used in the investigation of cybercrimes.

1

File compression/decoding applications include: (WinZip, WinRAR).

2

Video and image processing and analysis software

3

Digital forensic software such as: ProDiscover and CAINE (Computer Aided INvestigative Environment)

4

Command line forensic tools

5

Digital forensic hardware tools

6

Tasks performed by Digital forensic tools such as:

- Acquisition

- Validation and verification

- Extraction

- Reconstruction

- Reporting

7

Evaluating digital forensic tool needs

s.

Cyber crime

Responses (knowledge score)

Excellent (5)

Very Good (4)

Good (3)

Poor (2)

Very Poor (1)

8

Digital forensic software tools

9

Mobile device forensics

10

Desktop forensics

11

Email forensics

12

Smartphone analysis

13

Cloud analysis

14

IoT forensics

15

Triage and visualization

16

File analysis tools

17

Registry analysis tools

18

Internet analysis tools

19

Email analysis tools

20

Mobile devices analysis tools

21

Network forensics tools

22

Database forensics tools

23

Computer Forensics Methodology

24

Applications of Computer Forensics