Cyber Crime and Cyber Terrorism


REVIEWING THE REQUIREMENTS



Download 5,67 Mb.
Pdf ko'rish
bet70/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   66   67   68   69   70   71   72   73   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

REVIEWING THE REQUIREMENTS
The requirements of the investigation, or remit, provide the specific questions that 
need to be answered. This can be used to identify possible routes for analysis. It is 
important to ensure a thorough analysis of the requirements is made early on in the 
investigation to ensure that time and money are not wasted. From the remit, along-
side any background information provided, the following need to be identified as a 
minimum:
1. 
Number and type of exhibits
: so it is known what data is to be investigated
2. 
Individuals/business involved
: so it is known who is to be investigated
3. 
Date and times
: so it is known when the incident occurred, which will provide 
a time window to be investigated
4. 
Keywords
: what may be of interest during the investigation if it is found, this 
could be names or bank account numbers for example
5. Supplied data
: if a particular file or document on the data is to be looked for—
it is useful if a copy of this is provided
STARTING THE ANALYSIS
There may be a wealth of information gleaned from the captured evidence some of 
which may not be relevant. No one process or method will necessarily answer all the 
questions posed. It is important to remember the following points when reviewing 
information to ensure nothing is missed or misinterpreted:


65
 
Starting the analysis
1. 
False Positives
: files that are not relevant to an investigation but they may 
contain a keyword that is important
2. 
Positives
: files/data that are relevant to the investigation
3. False Negatives
: files that are not picked up but are relevant—they may be in
an unreadable format (for example, compressed or encrypted)
The actual analysis of the data will vary depending on the type of investigation that 
needs to be carried out. Therefore at the beginning of the investigation consideration 
and a careful analysis must be made of the actual questions that are being asked.
The analysis of data can be broken up into two stages:

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   66   67   68   69   70   71   72   73   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish