Using the online library, the Internet, and all course materials, research cyber
ID: 3750379 • Letter: U
Question
Using the online library, the Internet, and all course materials, research cyber criminals, their motives, and the forensic tools used to track an offender.
Summarize who you believe cyber criminals are, and why?
What do you believe are the motives of a cyber criminal? Why?
What are 3 ways to track an offender? Give an example of each.
What types of tools are used in the process of a digital or network investigation?
What information can be learned through these tools about the intrusion or other cyber crime?
What are the main investigative tools that all cyber crime investigators should have? What are some of the specialty tools that investigators would require for specific type of investigation such as network intrusion or mobile investigation?
Explanation / Answer
Answer)
Cyber Criminals are the potential hackers who either can be external or internal. They can be identity thieves, Internet stalkers, Phishing Scammers, Cyber terrorists etc.
As these people are involved in getting the information in an unauthorized way and also do harm to the organization hence are considered as Cyber Criminals.
The motives can vary from revenue fraud, or revenge, or fun, or evil motive.
Some of the ways to track the offender are as follows:
1) Using proxy server through VPN. Eg: VPN
2) Technologies to track like monitoring, reporting and audit techniques. Eg: Antivirus
3) Tor software provides encryption and helps to provide with the logs to trace back. Eg: Tor
4) Tools which are used in the process of a digital or network investigation are as follows:
Network encryption, proxies, firewalls, cyber liability insurance etc.
5) The information which can be collected are the logs, the IP address used, the time duration, the pattern used for hacking, intrusion or external etc.
6) Some of the tools are as follows:
IDS/IPS White Paper is such a tool that helps to check the network intrusion.
Some of the other tools are as follows:
Volatility, Linux 'dd', FTK Imager, ExifTool etc.
Hit like if you find the answer useful. :)
Hope this answer helps. Thanks
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.