{"id":5811,"date":"2020-01-17T12:44:26","date_gmt":"2020-01-17T12:44:26","guid":{"rendered":"http:\/\/veda.polac.cz\/?page_id=5811"},"modified":"2020-01-17T12:44:27","modified_gmt":"2020-01-17T12:44:27","slug":"5811-2","status":"publish","type":"page","link":"https:\/\/veda.polac.cz\/?page_id=5811&lang=en","title":{"rendered":"<!--03\/19 Pitfall of Tracing Digital Footprints in Case of Suspected Crime of Unauthorized Access to the Computer Syst\u00e9m-->"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Resume<\/p>\n\n\n<p><strong>Pitfall of Tracing Digital Footprints in Case of Suspected Crime of Unauthorized Access to the Computer Syst\u00e9m<\/strong><br \/><em>Ing. Miroslav \u010cerm\u00e1k<\/em><em>, Police Academy of the Czech Republic in Prague, postgraduate student<\/em><br \/><br \/>This paper describes to what it is necessary to pay extra attention in the course of tracing and securing digital footprints when an offense of unauthorized access to a\u00a0computer system and information carrier according to \u00a7 230 of Act No. 40\/2009 Coll. has been committed. This practice is common in a large organization where employees work in open spaces, have no permanent offices, and can access the network from any accessible computer or even from their private devices anytime and anywhere. This article practically gives advice how in such case effectively conduct a crime scene investigation, identify IT resources that need to be scanned on site, and ensure relevant digital footprints to convict the offender.<br \/><br \/><strong>Keywords:<\/strong> digital footprints, memory dump, disk image.<\/p>\n<hr \/>\n<p><a href=\"https:\/\/veda.polac.cz\/?page_id=5610&amp;lang=en\">Back<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Resume Pitfall of Tracing Digital Footprints in Case of Suspected Crime of Unauthorized Access to the Computer Syst\u00e9mIng. Miroslav \u010cerm\u00e1k, Police Academy of the Czech Republic in Prague, postgraduate student This paper describes to what it is necessary to pay extra attention in the course of tracing and securing digital footprints when an offense of [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5811","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/veda.polac.cz\/index.php?rest_route=\/wp\/v2\/pages\/5811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/veda.polac.cz\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/veda.polac.cz\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/veda.polac.cz\/index.php?rest_route=\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/veda.polac.cz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5811"}],"version-history":[{"count":1,"href":"https:\/\/veda.polac.cz\/index.php?rest_route=\/wp\/v2\/pages\/5811\/revisions"}],"predecessor-version":[{"id":5812,"href":"https:\/\/veda.polac.cz\/index.php?rest_route=\/wp\/v2\/pages\/5811\/revisions\/5812"}],"wp:attachment":[{"href":"https:\/\/veda.polac.cz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}