Book Description
The exact operation of the internet and our digital devices is a mystery to many, even though we use it every day. We run into technical problems that we often cannot solve on our own. When we become a victim of crime, we feel even more vulnerable in this virtual space. Digital crooks can’t wait to take advantage of the unpreparedness of others. They take the opportunity to obtain our confidential information and assets as soon as they can. The security of our own data and assets, the data we handle in the course of our work and that of our workplace comes under risk every time we connect to the internet. Many of us will sooner or later meet the first digital fraudsters, blackmailers, and bullies. What can we do to prevent our beautiful new digital world becoming a nightmare? This publication seeks to provide an answer to this. As a legal practicioner, the author has encountered several similar crimes, describing from his experience what happens in a real criminal investigation when digital data needs to be found. We examine in detail the tools and methods that members of the investigating authorities also work with on a regular basis. We analyze one by one the solutions that can be used to do this to understand how is it possible, which we considered to be impossible: identifying the unknown, faceless digital crooks based on the digital traces they have left behind. Our publication starts from the basics and helps you learn in a simple, fun way everything that benefits anyone who cares about their own digital security. We also provide knowledge that is a good starting point for future experts who wish to familiarize themselves with the world of cybercriminals more seriously due of their occupation and studies.