Monday, January 14, 2019
Faceless Crimes
Part I. Computer crimes or cybercrimes have been on the rise since the introduction of the Internet. More so with the onrush of mobility and the launch of wireless networking, the increase in mischievous computer activities was exponentially high. Since cybercrimes argon considered faceless crimes where a criminal hacker can do their misdeeds miles or continents a counseling, or set-up a logic bomb a few hours later, it has been more difficult to trace these malicious acts.In determining specialized categories or types of IT-related attacks, it is noteworthy to examine the lists prepared by Mandia et al. (2001) in the take Incident Response investigating Computer Crime1.Denial-of-service attacks are near of the easiest incidents to respond to, because they do not involve actual intrusions.2.Unauthorized uses of resources are typically insiders using their computers in an inappropriate manner. These investigations are often more orient around personnel rather than technical issue s.3.Theft of information attacks involves unauthorized read-only entrance fee to information. While these are typically solved easily through configuration, it is in truth difficult to tell through an initial investigation if the aggressors access is read-only or actually composite a full-blown computer intrusion.4.Vandalism is really a subset of computer intrusion, because it is not possible with knocked out(p) access to the victim system.5.Computer intrusions are the mother of all incidents, in that they require the most involved response.The ruff way to determine unauthorized computer access, downloading, copying and transferring of classified or secluded materials is by examining and evaluating the log files and access control lists. Unless the intruder or attacker is a sophisticated or high-caliber criminal hacker, this is the quickest and simplest method available, differently hiring trained professionals who will do computer forensics investigation is necessary to shit criminal liability and culpability.Part II. Depending upon the forensics investigator, there are various techniques or methodologies in investigating cybercrimes. But in general, there are quartette major steps namely evidence identification, evidence preservation, evidence compendium and evidence presentation (Solomon et al., 2005).There are two major tools undeniable in forensics investigation, the first are the turn imaging and validating tools and the instant are the forensics tools. Disk imaging and validating tools basically check the rightfulness of the hard disks and creates a mirror copy of the hard disk involved in the investigation. Forensics tools are the hardcore equipment that does data analysis, recovery and rebuilding, for deleted files and data.Numerous tools are available commercially on the market. One important note for an draw a bead on computer forensics investigator is that all tools to be utilized in the railway line of their trade should be properly li censed and the utilize is authorized by the vendor otherwise the case might be thrown out of court for using pirated or illegally purchased software.Some of the common disk imaging and validation tools as listed by Solomon et al. (2005) are ByteBack by Tesch Assist, inc. and used for data recovery EnCase from Guidance Software is one of the best drive duplicators and Norton Ghost by Symantec provides the ability to create disk copies that are almost exact copies of the original. Solomon et al. (2005) also listed SMART by ASR Data scholarship as a suite of forensics examination tool and WinHex ftom X-Ways is a ecumenic hexadecimal editor and disk management utility.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment