Cyber Crime and Cyber Terrorism


LIVE AND ONLINE DATA CAPTURE



Download 5,67 Mb.
Pdf ko'rish
bet68/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   64   65   66   67   68   69   70   71   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

LIVE AND ONLINE DATA CAPTURE
Live data capture is utilized when the device is not taken offline: that is, it is decided 
not to turn it off. For example if a critical business server is taken offline it may 
cause disruption or loss of revenue for the business. If a program is running, it may 


63
 
The “crime scene”
mean critical data will be lost or it will not be possible to recover that information 
if the power is removed. This can also be the case when dealing with encryption: if 
the power is turned off, the data is no longer in a format that is accessible without 
the correct password.
A high-tech investigation should enable someone to follow the steps performed 
and produce exactly the same results. However, the problem with live data is that it 
is in a constant state of change, therefore it can never be fully replicated. Although, 
these issues exist, it is now accepted practice to perform some well-defined and 
documented live analysis as part of an investigation, and the captured data can be 
protected from further volatility by generating hashes of the evidence at the time that 
it is collected.
Traditionally, when looking for evidence in relation to website access, data would 
be captured from the local machine in the form of temporary internet files. However, 
as advanced Internet coding technologies leave fewer scattered remnants on a local 
machine, techniques must now be used to log onto an actual webpage and grab the 
contents that can be seen by a user. Alternatively, requests can be made of the service 
provider to produce the information. This process requires detailed recording of the 
actions performed and a hash of the file at the conclusion. An example of online 
data capture is the capture of evidence from Social Networks, which is now becom-
ing progressively prominent in high-tech investigations, including those related to 
cyberbullying.
With live data, even with the securing of a physical crime scene, it is still possible 
that an outside influence can be applied to the digital data, such as remote access. It is 
very important therefore that this information is seized digitally as soon as possible. 
If possible the data on the device should be reviewed and once satisfied that data 
will not be lost, the device should be isolated from network communication, mobile 
signals or any other form of communication that could allow data to be removed or 
accessed remotely. In large organizations support should be sought from the system 
administrators to help in the identification and isolation of digital devices, to prevent 
unwanted corruption of important data. The devices can then be removed or the data 
captured using appropriate tools.

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   64   65   66   67   68   69   70   71   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish