Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet66/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   62   63   64   65   66   67   68   69   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

DIGITAL LANDSCAPES
Traditionally digital forensics focused on the single home computer or a business’ lo-
cal area network (LAN). But in a world where networks are prolific, with the advent 
of the Internet and the mass market of portable devices, digital evidence can come 
from almost any device used on a daily basis. It is therefore important to consider 
different technical routes and peculiarities when dealing with the digital evidence.
The advent of advanced technology within business and at home now means that 
more advanced techniques of data capture are required. This has led to the develop-
ment of live, online and offline data capture techniques. The remit of the investiga-
tion and the technology to be investigated will determine the data capture technique 
performed. However, the key to the data capture phase is that the captured data’s 
integrity can be confirmed and verified.
THE “CRIME SCENE”
As with any kind of investigation it is important to plan prior to performing an 
investigation, in particular where physical attendance is required at a “crime scene,” 
this will not always be possible, or required. Digital devices can appear within any 
investigation and it is easy to overlook the significance of a digital device to a par-
ticular investigation type.
Before attending a “crime scene” pre-search intelligence is key in identifying the 
layout of the scene, the potential number of people or devices, and the type of digital 
information relevant to the investigation. This information allows the organization 
of equipment and resources that may be required to seize or capture the data. Early 
consideration should be made as to whether digital devices can be removed from 
the “crime scene” or whether data needs to be captured and then brought back to the 
laboratory for analysis.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   62   63   64   65   66   67   68   69   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish