|
This chapter examined various ways in which the nature of a computer crime can affect the process of forensically investigating the crime. It is imperative that you be aware of the different crimes and how to investigate them. For example, seeking email evidence would be useful for investigating cyberstalking, but would not be useful for most denial of service attacks. It is important that forensic investigators have a working knowledge of how these attacks are committed in order to properly investigate them.
|