• How it works
  • Guide To Digital




    Download 430,06 Kb.
    bet2/17
    Sana21.05.2024
    Hajmi430,06 Kb.
    #248066
    TuriGuide
    1   2   3   4   5   6   7   8   9   ...   17
    Bog'liq
    DigitalEvidence

    Internet: The launch of the Internet or World Wide Web in the mid 1990’s truly ushered in the ‘age of access.’ For the first time, individuals outside the academic world could use it to connect with others (and their computers) in a brand new way. The Internet opened up access to a world of information and resources, but also provided a highway for the traffic of illegal images, information and espionage.
    Because of the global access to information and to other computers,
    criminals are able to use this access to hack into financial and
    communications systems, major corporations and government networks to steal money, identities and information, or to sabotage systems. One of the biggest challenges in Internet crime is for investigators, laboratory and technical personnel to understand how the process works and to stay closely engaged with advances in software and tracking technologies.
    How it works: Any computer that connects to an Internet Service Provider (ISP) becomes part of the ISP’s network, whether it is a single computer or part of a local area network (LAN) at a work place. Each ISP connects to another network, and so on. In this way, the Internet is literally a web of networks where information can be sent and received to any point on the web from any other point. This global collection of networks has no ‘owner’ or overall controlling network, so it operates like a community with all the pros and cons you might find in any other community.

    Computers: In the late 1970s, employees at the Flagler Dog Track in Florida used a computer to create and print fraudulent winning tickets. This prompted Florida to enact the first computer crime law, the Florida Computer Crimes Act, which declared un-­‐authorized use of computing facilities a crime. Federal laws followed in 1984.
    Computer crimes continue to be a growing problem in both the public and private sector. A single computer can contain evidence of criminal activity carried out on the web, or the criminal use can be contained in the computer itself, such as pornography, copyright infringement, extortion, counterfeiting and much more. Digital evidence is located on the computer’s hard drive and peripheral equipment, including removable media such as thumb drives and
    CD-­‐ROM discs.

    Download 430,06 Kb.
    1   2   3   4   5   6   7   8   9   ...   17




    Download 430,06 Kb.