Please enable JavaScript.
Coggle requires JavaScript to display documents.
CAP 19 - Investigations and ethics (2 Major categories of computer crime…
CAP 19 - Investigations and ethics
1 Investigations
Investigation types
administrative investigations (operational issues, policy violations)
criminal investigations(very strict evidence collection and preservation needed)
civil investigations
regulatory investigations (conducted by gov agencies for administrative law violations)
Evidence
admissible evidence
the evidence must be
relevant
the fact that the evidence seeks to determine must be
material
(related) ti the case
the evidence must be
competent
(legally obtained)
types of evidence
real evidence
documentary evidence (best evidence rule + parol evidence rule)
testimonial evidence
gathering evidence
voluntary surrender
subpoena or court ordr (evidence may be altered)
search warrant
2 Major categories of computer crime
military and intelligence attacks (obtain classified info)
business attacks (obtain confidential info)
financial attacks (obtain money or other services)
terrorist attacks (to disrupt normal life and instill fear)
grudge attacks (es: performed by an ex employee to damage his organization for some personal reason)
thrill attacks (for fun, possible service interruption)
3 Ethics
ISC2 Code of ethics
protect common good
integrity
diligent service to your organization
keep your knowledge current
Ethics and the Internet (RFC 1087)
seeking to gain unauthorized acces is unhetical
disrupting intended use of the internet is unhetical
wasting resources is unheatical
destroying integrity of computer based information is unhetical
compromising the privacy of users is unhetical
Ten commandments of computer ethics