Page 156 - Cyber Defense eMagazine December 2022 Edition
P. 156

Indeed, the majority of the high-tech users strongly cope with the cyberspace leaving there a plenty of
            the information about their activities within the network. For instance, it’s always possible to check out if
            anyone  has  used  some  method  of  the  payment  through  the  banking  system  as  those  services  are
            completely online or in other words, belong to the cyberspace. On the other hand, someone can create
            an email account and offer a lot of the information about such a chosen identity making everything about
            such a communication channel being visible to the authorities through some tracking techniques, as well
            as uncovering such time and space coordinates anytime some logging has been done. Such information
            must be accurate and the defense communities will trust them as they are an outcome of the exact
            sciences and can offer just a true trustworthiness to the case officers. In a cyber security, there is a strong
            awareness that any user relying on the current technological advancement in order to take advantage
            over the online services must leave a footage and in a case of the web-based endeavors those traces
            are  recognized  as  an  IP  address  within  the  virtual  domain  or  some  signal  emitting  among  some
            telecommunication assets, so far.

            The crime scene is a broadly transferable term which not necessarily covers the incident spot, but more
            likely the majority of the information about the offenders’ motion and planning. In such a sense, it’s
            needed to capture the entire criminals’ actions not only being focused on a place of the offense, but more
            widely observing the case from many different angles trying to figure out the locations where the bad
            actors might be uncovered leaving some track about their coordinates via activated cyberspace devices.
            The entire system with the high-tech infrastructure is capable to nowadays detect some footage and once
            those capacities have finished the identity confirmation gather a true fortune of the helpful findings further
            concentrating on the case management. In other words, in order to collect and analyze findings from
            some account or the other cyberspace advancements it’s necessary to identify who the person behind
            those activities is and where such an individual is based.

            On  the  other  hand,  what  the  priority  with  the  modern  criminology  is  to  very  carefully  go  through  all
            registration  forms  even  belonging  to  the  Police,  web  accounts,  telecommunication  assets,  banking
            services and much more and in such a case applying a highly centric analysis attempt to come to certain
            findings about some persons of the criminal justice case interest to the authorities, so far. Also, if through
            such an analysis there can be more than obvious any single detail regarding the situational awareness
            those results can also serve in the crime prevention as any single lawfully resolved case is used in
            developing some approaches in banning the criminals succeed with the same scheme again. Indeed, the
            authorities must work hard on patching such vulnerabilities as the risk management techniques would be
            improved offering a truly dedicated service to the communities. In the practice, it takes time to make a
            good analytics as there are so many data which must be taken into consideration and correlated with
            each other as those that are in a lawful business will always seek some information from those who want
            to use their services and in such a fashion those organizations will require to get provided with some
            user’s details as they must maintain their legal status and if demanded by the law cooperate with the law
            enforcement in case of any illegal occurrence, so far.



            Ways of Coping with Tendencies

            The only predictable thing in the future is a change which means a lot of new concepts, theories and
            practices being capable to accelerate a technological progress and impact the lives of the majority of the




            Cyber Defense eMagazine – December 2022 Edition                                                                                                                                                                                                         156
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   151   152   153   154   155   156   157   158   159   160   161