In this chapter, you will find: 

5. Specific guidelines
5.1 About notion of computer system
5.2 About botnets
5.3 About Transborder access to data
5.4 About identity theft and phishing in relation to fraud
5.5 About DDOS attacks
5.6 About Critical information infrastructure attacks
5.7 About New forms of malware
5.8 About Spam 
5.9 About Production orders for subscriber information 
5.10 About Terrorism