Page 47 - Cyber Warnings
P. 47







hacker would officially or unofficially work for some country and try to obtain the confidential
information from the enemy country through cyber means.

Finally, the real cyber criminals could be some sort of adventurists – similarly as the guys who
would plan the armed robbery of the bank – but their reasons are more or less the same – they
want the MONEY! In other words, those folks would be so financially motivated and seek an
opportunity to use their skills to get a good benefit.

Luckily to all of us, anyone doing anything in a cyberspace would leave a trace, so it’s mainly
possible to resolve such a case.

The area dealing with such a capacity is called cyber forensics and through this effort – we
would analyze how cybercrime investigation goes on and how capable the Law Enforcement
agencies of today are to conduct a skillful investigation and prepare a qualitative documentation
for the court.


Step 2: The cybercrime got discovered

Once the bad guys got a condition to commit a cybercrime, they would do so. It’s a matter of
routine checkups when such a case would get discovered. It’s recommended to periodically
control your IT asset in order to confirm if everything got appropriate.

Once the IT Security Professionals have discovered a cybercrime, they would contact the
authorities which would conduct a skillful investigation using digital forensics tools.

Those tools would offer to experts to capture some evidence and prepare them for the next step
of the investigation which is an analysis.

Here, we would want to mention that some digital forensics tools could be downloaded from the
web for free, but it’s necessary to leave your personal details in any case.

This would suggest that such a marketplace got well-controlled, so IT Security Professionals
would mainly use those resources.


Step 3: The investigation has happened

The next step with the investigation after collecting the evidence and not interfering with the
cybercrime scene making the permanent changes would be to analyze such a gathered data.

It’s necessary to pass through many trainings and educations as well as gain a plenty of
practical experience before you become a Digital Forensics Professional.

47 Cyber Warnings E-Magazine November 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   42   43   44   45   46   47   48   49   50   51   52