Introduction to Forensic Evidence and Crime Investigation

2112 Words9 Pages
Unit 1: Introduction to Forensic Evidence and Crime Investigation May 1, 2012 CONTENTS Introduction 3 Definition of Cyber Terrorism 4 Types of Evidence 6 References 8 Introduction The proliferation of computers connected to telephone modems that began in the early 1980s increased the vulnerability of computer systems and enabled the birth of hackers, individuals capable of illegally entering computer networks and even of altering its content. This vulnerability made United States intelligence agencies began to speculate on the possibility of some terrorist group to commit attacks or acts of sabotage on a large scale using telematics media, without even that the aggressor is within United States territory. To denote that any category of terrorist acts is coined the term cyber terrorism. The hypothetical attacks cyber terrorists fear was accentuated during the year’s ´90 due to several factors, such as the emergence of the Internet and its massive penetration into society. This multiplied the amount of existing modems; it increased the vulnerability of many private networks (as they came to be connected to the Internet, which is a network of public access) and encouraged the proliferation of hackers to penetrate a network illegally or manufacture virus capable of infecting thousands of computers, became increasingly easier. Definition of Cyber Terrorism The facts behind what constitutes a violation of the security of cyber-terrorists and crime characterized by cyber terrorism as the attack carried out by a group of people against computers, software, networks, and other information and communication technologies with the aim of intimidating the population or extort money from Governments or international organizations always and when that attack has the potentiality of causing serious harm to persons. Like what happens with computer-related

More about Introduction to Forensic Evidence and Crime Investigation

Open Document