12.07.2015 Views

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The Indian <strong>Police</strong> JournalCourts/Jury <strong>and</strong> periodic training programme to update their skills<strong>and</strong> knowledge. It has become inevitable for Law enforcement tounderst<strong>and</strong> the implication <strong>of</strong> Cyber Crimes <strong>and</strong> needs a structured/formalized approach in Cyber Crime investigation.Emerging Characteristics <strong>of</strong> Cyber CrimePrimary objective <strong>of</strong> a cyber criminal is to target the informationthat is an asset to any organization. Crimes are categorized based onmalicious intention caused <strong>by</strong> motivation. Motivation falls into fourcategories. Motivation may be due to greed, challenge <strong>and</strong> maliciousintent. A comprehensive discussion <strong>of</strong> criminal intention is beyondthe scope <strong>of</strong> this paper. Based on the value <strong>of</strong> the information asset,different forms <strong>of</strong> Cyber Crimes are being committed. These include:cyber-fraud, identity theft, cyber-bullying, denial <strong>of</strong> service, childpornography. The means through which these crimes are committedare <strong>by</strong> crimeware. Crimeware may be a virus, worm, Trojan, keylogger, malicious code <strong>and</strong> the like. Considering the forms <strong>and</strong> meansthrough which these attacks are targeted, the main objective falls intothree categories:• Collection <strong>of</strong> information;• Distribution/dissemination <strong>of</strong> the information collected there<strong>of</strong>;<strong>and</strong>• Use the information to perform further attacks.The magnitude <strong>and</strong> impact <strong>of</strong> such targets becomes apparent.Underst<strong>and</strong>ing these objectives <strong>and</strong> underlying technology involvedif the type <strong>of</strong> attack exhibits polymorphism causing coordinated attacks collecting the evidence, consideration must be given to electronicevidence that is scattered globally.Exploitation TacticsCyber criminals operate to target information assets available innetworked environment to cause extensive combination <strong>of</strong> attacksthrough covert channels. The attacks are caused <strong>by</strong> vectors : a98 January - March, 2013

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!