Using the online library, the Internet, and all course materials, research cyber
ID: 3750815 • Letter: U
Question
Using the online library, the Internet, and all course materials, research cyber criminals, their motives, and the forensic tools used to track an offender.
Summarize who you believe cyber criminals are, and why?
What do you believe are the motives of a cyber criminal? Why?
What are 3 ways to track an offender? Give an example of each.
What types of tools are used in the process of a digital or network investigation?
What information can be learned through these tools about the intrusion or other cyber crime?
What are the main investigative tools that all cyber crime investigators should have? What are some of the specialty tools that investigators would require for specific type of investigation such as network intrusion or mobile investigation?
Explanation / Answer
From my perspective cyber criminals are those hackers who have talents but they didn't get any way to show what they can do. Their minds got distracted and they became hackers who commit crimes to gain personal access of a company or to destroy the informational data of the company. Some people do because they didn't get well professioned job some do to gain popularity. As in today's world every person want to live a luxurious life no matter what they have to do.
After going through internet got to knew the most important thing for survival in today's world is money which can be earned by hacking into a bank account system. Hacking personal information of a company to bankrupt to gain popularity which in turn gives lots of money. Also one of the motive is ego which leads to cyber crime. Some are mad about entertainment and hacking into every system entertain them.
Tracking an offender is not easy as they hack easily because breaking into something is easy but securing it is not easy as we think. There are various ways but we have to try legal ways to offend them.Services like email and Usenet are based on simple text-based initiation protocols and basically use the honor system. This complicates investigations because we cannot necessarily trust the identification information contained within Internet messages. While tracking them if found an IP address of California don't go for California try to find out its external IP address.The uniqueness of addresses and the distinction between network and host portions of the address make it practical for routers to know where to route to. The network part of an internet address is assigned by IANA to each network owner and host part is assigned to individual owner and devices by network. The network may be run by an organisation and it may be run by internet service provider.
For better research and investigation developers have created tools for forensic department so that they can deal with Innova and cyber crimes. The set of tools have many categories :
Based on these classification fornesic police uses tools accordingly to deal with the crime.
** If this answer helps give a thumbs up and hit comments if any changes to the answer and I will try to get on it as soon as possible.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.