
Fighting Cyber Crime is a challenging task. Sometimes it feels like the cyber criminals will always be just one step ahead of us. We have to be constantly developing new tools, new technologies, new procedures, and even new fields of study just to keep up.
Law enforcement agencies and governments are creating cyber crime units to combat the ever-increasing cyber crime-rate. However, since cyber crime is relatively new, there aren’t a lot of experts available to train these units. Many colleges are now offering degrees in new fields like cyber crime and cyber forensics (process of extracting data from devices or systems, usually to examine as evidence of a cyber crime) just to create these experts.
Because the Internet is a global community and cyber criminals can launch coordinated attacks from all over the globe, catching them often requires the collaboration of many people. Governments, law enforcement agencies, companies, and cyberspace experts from many different countries must work together to track them down. This becomes more difficult as cyber crime continues to grow and criminals develop new methods.
What information is required to lodge a complaint?
- If you are a victim of hacking
Bring the following information- Server Logs
- Copy of defaced web page in soft copy as well as hard copy format, if your website is defaced
- If data is compromised on your server or computer or any other network equipment, soft copy of original data and soft copy of compromised data.
- Access control mechanism details i.e.- who had what kind of the access to the compromised system
- List of suspects – if the victim is having any suspicion on anyone.
- All relvant information leading to the answers to following questions –
- what ? (what is compromised)
- who? (who might have compromised system)
- when?(when the systme was compromised)
- why?(why the system might have been compromised)
- where?(where is the impact of attack-identifying the target system from the network)
- How many?(How many systems have been compromised by the attack)
- If your are a victim of e-mail abuse, vulgur e-mail etc.
Bring the following information-- Extract the extended headers of offending e-mail (If you do not know how to extract header please refer to section 1 of this FAQ).
- Bring soft copy as well hard copy of offending e-mail.
- Please do not delete the offending e-mail from your e-mail box.
- Please save the copy of offending e-mail on your computers hard drive.
No comments:
Post a Comment