A good understanding of the flow for a typical cybercrime investigation process, is VERYimportant! This is because it provides an
abstract reference framework that isindependent of any particular technology or organisational environment; OR ANY STATE!
The description of CyberCrime. Its processes, identifying issues ranging from Tools,Techniques in carrying out a credible CyberCrime Investigation; to Reporting the Findings of such investigation; in an acceptable manner, that a Court (of competent jurisdiction); will be satisfied and comfortable at reaching her verdict!
1: The different steps, from the detection and / or reporting of an incident, to conducting aCybercrime investigation exercise, through to the final stage of reporting the findings of suchinvestigation.
2: Identify potential (and / or real) digital evidence(s), and how to obtain these different kinds of digitalevidence, from different devices and platforms – (e.g. emails, social media, IP addresses, etc).
Cybercrime investigations has been tagged..beyond Forensics; TRUST, but VERIFY!!…………from evidence to verdict!
Net Crime
The term, ‘Net crime is used to describe, the Criminal use and exploitation of the ‘International Network’ (a.k.a. the Internet).
Cybercrime,
May also be referred to as: Computer Crime.
What does the Word or TERM CYBER Mean?
The TERM ‘CRIME’ Defined – A CRIME, is an unlawful act committed or omitted, which constitutesan offence in violation of a public law, either forbidding or commanding it; a breach or violation ofsome public right or duty and such act(s) are forbidden, and is punishable by law, either of a state(i.e. government) or other authority.
An act that constitutes an:
1. Offence,2. Unlawful act,
3. Illegal act, 4. Breach/violation/infraction of the law, 5. Misdemeanour, 6. Misdeed, 7. Wrong, 8. Felony, 9. Violation, 10. Transgression, 11. Fault, 12. Injury and 13. ManyMore
CyberCrime – Types and Categories
Cybercrime can be broadly categorised into Two types
Type 1 Cybercrime
– Cybercrime referred to as a type 1 crime , is usually of a single event, from the perspective of the victim It is mostly technological in nature e.g.
Flaws in a Web Browser – Hackers often carry out Type 1 cybercrime, by takingadvantage to place a Trojan horse virus onto the unprotected victims computer; suchvirus, installs a keystroke logger on the computer that enables the hacker steal privatedata e.g. internet banking details
Phishing – Victim receives a supposedly legitimate email e.g., claiming to be a bank orcredit card company, with a link that leads to a hostile website. Once the link is clicked,the PC can then be infected with a virus
Multifarious Crimes – Any other cybercrime that relates to theft or manipulation of data orservices via hacking or viruses, identity theft, and bank or e-commerce fraud.
Cybercrime ranges across a spectrum of activities. At one end are crimes that involve fundamental breaches of personal or corporate privacy, such as assaults on the integrity of information held in digital depositories and the use of illegally obtained digital information to blackmail a firm or individual. Also at this end of the spectrum is the growing crime of identity theft. Midway along the spectrum lie transaction-based crimes such as fraud, trafficking in child pornography, digital piracy, money laundering, and counterfeiting. These are specific crimes with specific victims, but the criminal hides in the relative anonymity provided by the Internet. Another part of this type of crime involves individuals within corporations or government bureaucracies deliberately altering data for either profit or political objectives. At the other end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet. These range from spam, hacking, and denial of service attacks against specific sites to acts of cyberterrorism—that is, the use of the Internet to cause public disturbances and even death. Cyberterrorism focuses upon the use of the Internet by nonstate actors to affect a nation’s economic and technological infrastructure. Since the September 11 attacks of 2001, public awareness of the threat of cyberterrorism has grown dramatically.