||Oracle Tips by Burleson
Chapter 5 -
All About Cybercrime
Threats over the Web
The checklist below is designed to help take
some of the guesswork out of the question. Working through the list
provides answers that can help with the decision of how to proceed.
Remember that this is only a checklist and a general guide at best.
If, after going through the list, the results are not agreeable,
then take action according to what seems best. In the final
analysis, the experts consulted for this book agreed; err on the
side of caution. No one should ever let themselves be talked out of
going to the authorities if they feel it is the right thing to do.
Figure 5.2 - A “yes” answer to any of these questions
indicates a serious problem.
Once law enforcement becomes actively involved,
all messages received will be evaluated by one or more computer
crimes technicians. These tech-enabled officials know how to
extract what evidence there is to be had from these messages, much
like another kind of detective might lift fingerprints from a
glass. This information may help lead law enforcement officers back
along the pipeline through which the message passed, and hopefully,
to the original sender.
Victims should not send copies of suspect
messages to friends or any other mailbox for that matter. It is
possible the messages are tainted, possibly with a virus or that the
sender of the original is able to cipher if and where the message
has been forwarded. Additionally, copied messages are of less value
evidentially, as seems intuitive; copies of copies only mire the
Download your Oracle scripts now:
definitive Oracle Script collection for every Oracle professional DBA