Code of Ethics for Cybercrime Investigators
| |

(Source: International Association of Computer Investigation Specialists) Maintain the highest level of objectivity in all forensic investigations and present the facts correctly;   Examine and analyze in detail the evidence;   Examine in compliance with established principles and validated by … Read More

Council of Europe: Convention on Cybercrime – CETS No.: 185
| |

Preamble The member States of the Council of Europe and the other States signatory hereto, Considering that the aim of the Council of Europe is to achieve a greater unity between its members; Recognising the value of fostering co-operation with … Read More

Preparing team members participating in the cybercrime investigation
| |

Nature of crime requires criminal investigation to achieve within a team of investigators. The need of the investigation within a team emerges from the need to ensure a greater objectivity and effective conjugation skills and specializations derived from team members. … Read More

Analysis of samples in cybercrime
| |

Transporting of samples in laboratory Transporting samples must be carefully done, given their fragility. It is necessary to take precautions about protecting against physical shock, humidity, heat or especially the influence of electromagnetic waves. On this latter point should be … Read More

Witnesses in cybercrime
| |

The persons present at the search, or other person aware of the operation of the computer system, can give important information. Each witness should be interviewed on how the lifted systems are used. There are revealed the methods of input, … Read More

The concept of “cybercrime”
| |

Cybercrime is a phenomenon of our time, often reflected in the media. One study indicates that fear of attacks even exceed the intensity to ordinary theft or fraud. Criminological research on crime made by computer systems is still under exploration. … Read More

Vulnerabilities and unauthorized results in cybercrime
| |

Vulnerabilities To get the results he want, an attacker must use a computer or network vulnerability, which is defined as follows: Vulnerability is a weakness of the system allowing unauthorized action. These are errors that occur in different stages of … Read More

Attacks and tools in cybercrime
| |

Attacks Sometimes, an event that occurs on a computer or network is part of a series of steps to produce an unauthorized event. This event is then considered as part of an attack. An attack has several elements. First, it … Read More

Cybercrime
| |

In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and “steal” all your valuable data. Just as in the real world, … Read More