Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet82/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   78   79   80   81   82   83   84   85   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

75
 
Seizing equipment
safe. Hence one of the principle objectives in identifying a malicious party is often 
to associate them with their online persona, e.g., IRC handle, nickname, or twit-
ter username. In digital forensic and hacking communities there is a term “doxing” 
which discusses how this can be achieved. Doxing is a term derived from the words 
document and tracing and essentially is the process of collecting information about 
Internet users which they would rather not be known, and of which they are prob-
ably not aware they have made available publically. Performing a successful “dox” 
involves gathering information such as, full name, date of birth, usernames, email 
accounts, home addresses, phone numbers, personal images and of course the online 
nicknames and handles of an individual. The techniques and practices necessary to 
perfect doxing involve a deep understanding of search engine operators, and how to 
collect together information from online sources such as social media, online ad-
vertising or anywhere else where information may have been published or leaked. 
They involve intelligent methods of cross referencing information between sources 
to build a profile of the suspect. Again, for the cyber investigator the aim here is 
to associate the incriminating evidence published via an alias with the suspect true 
identify with a view to gain a search and/or arrest warrant.
COLLECTING EVIDENCE
Once a search warrant has been granted, evidence of the suspected crime needs to 
be obtained; there are strict guidelines for how equipment should be seized, digital 
images acquired and evidence stored. These guidelines can vary dependent upon the 
jurisdiction of where the suspected crime took place, however, they all share pro-
cesses related to the physical requirements, e.g., preservation of evidence. These will 
be discussed in the following sections.

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   78   79   80   81   82   83   84   85   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish