When determining where the evidence you need might be located, understanding how people think can be helpful. You can't be a good forensics expert or good cop unless you know how criminals think.
According to experts, criminal behavior is often caused by a combination of environmental, psychological, and biological factors. Certain characteristics (such as short attention span, lack of impulse control, and poor home life) are likely predictors of criminal behavior. Although most crimes are committed by young men in their teens and twenties, this is not always the case where computer crimes are
You must understand your enemy. Hackers are usually unconventional thinkers who
So, what motivates criminal activity?
Anger or Revenge
An estimated 58 percent of companies surveyed
Network Disruption A denial of service (DoS) attack does just that; it denies service. A DoS attack can completely shut down a network. High- profile sites are frequently hit with denial of service attacks.
Financial Gain This includes the theft of customer data, corporate trade secrets, competitive information, and actual money.
Data Destruction This includes the rerouting of data intended for a particular site and overloading a site with data not intended for it, thereby crippling the server and rendering a site useless.
This includes active and passive pedophiles, S&M
When searching for data, you need to realize that users who want to store data and hide its actual content from others may do so in a number of ways. One of the most common ways to hide data is to change the filename and the extension associated with a file so that it doesn't look suspicious. Although it can be difficult to determine if an original filename has been changed, most forensic software can detect a change made to the file extension. An
A technique that uses a filter to analyze both the header and the contents of the datagram, usually referred to as the packet payload.