{"title":"在网络犯罪调查中提供法医和刑事技术支持","authors":"A. Padalka","doi":"10.21830/19006586.901","DOIUrl":null,"url":null,"abstract":"The issue of cyber security has become a key State objective in Ukraine. Cyber espionage and cyber-attacks by intelligence agencies (predominantly non-democratic countries) have become the most significant modern threat to automated systems, surpassing ordinary crimes seeking profit. Besides effective protection and immediate responses to counter cyber threats, cyber incident investigations are an important element that must be conducted by authorized law enforcement agencies and intelligence agencies when necessary. This article considers key aspects and issues to suggest practical recommendations to prepare and appoint forensic expertise in cybercrime investigations. Furthermore, it addresses the objects under examination, their removal’s particularities and the questions to ask telecommunications and technical computer experts","PeriodicalId":52330,"journal":{"name":"Revista Cientifica General Jose Maria Cordova","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Forensic and technical criminalistics support in cybercrime investigation\",\"authors\":\"A. Padalka\",\"doi\":\"10.21830/19006586.901\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The issue of cyber security has become a key State objective in Ukraine. Cyber espionage and cyber-attacks by intelligence agencies (predominantly non-democratic countries) have become the most significant modern threat to automated systems, surpassing ordinary crimes seeking profit. Besides effective protection and immediate responses to counter cyber threats, cyber incident investigations are an important element that must be conducted by authorized law enforcement agencies and intelligence agencies when necessary. This article considers key aspects and issues to suggest practical recommendations to prepare and appoint forensic expertise in cybercrime investigations. Furthermore, it addresses the objects under examination, their removal’s particularities and the questions to ask telecommunications and technical computer experts\",\"PeriodicalId\":52330,\"journal\":{\"name\":\"Revista Cientifica General Jose Maria Cordova\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Revista Cientifica General Jose Maria Cordova\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21830/19006586.901\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Revista Cientifica General Jose Maria Cordova","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21830/19006586.901","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Social Sciences","Score":null,"Total":0}
Forensic and technical criminalistics support in cybercrime investigation
The issue of cyber security has become a key State objective in Ukraine. Cyber espionage and cyber-attacks by intelligence agencies (predominantly non-democratic countries) have become the most significant modern threat to automated systems, surpassing ordinary crimes seeking profit. Besides effective protection and immediate responses to counter cyber threats, cyber incident investigations are an important element that must be conducted by authorized law enforcement agencies and intelligence agencies when necessary. This article considers key aspects and issues to suggest practical recommendations to prepare and appoint forensic expertise in cybercrime investigations. Furthermore, it addresses the objects under examination, their removal’s particularities and the questions to ask telecommunications and technical computer experts