Apoyo criminalístico forense y técnico en la investigación de la ciberdelincuencia

La lucha contra las ciberamenazas en Ucrania

Palabras clave: ciberamenaza, ciberataque, ciberdelincuencia, ciberincidente, criminalística, peritaje forense, Ucrania

Resumen

La ciberseguridad se ha convertido en un objetivo clave del Estado en Ucrania. El ciberespionaje y los ciberataques de las agencias de inteligencia (predominantemente de países no democráticos) se han convertido en la amenaza moderna más importante para los sistemas automatizados, superando los delitos ordinarios con fines de lucro. Además de la protección efectiva y respuesta inmediata a las ciberamenazas, la investigación de los ciberincidentes es un elemento clave llevado a cabo por organismos policiales y de inteligencia autorizados cuando sea necesario. Este artículo considera aspectos y cuestiones clave para sugerir recomendaciones prácticas para la preparación y contratación de expertos forenses en estas investigaciones. Además, aborda los objetos examinados, las particularidades de su eliminación y las preguntas que deben formularse a los expertos en telecomunicaciones e informática.

Descargas

La descarga de datos todavía no está disponible.

Biografía del autor/a

Andrii Padalka, Instituto Ucraniano de Investigación y Ciencia de Equipos Especiales y Pericia Forense del Servicio de Seguridad de Ucrania, Ucrania

Ph.D. en Ciencias Jurídicas, Director Adjunto del Instituto Ucraniano de Investigación Científica y de Equipos Especiales y Pericia Forense del Servicio de Seguridad de Ucrania, y Profesor Asociado en el Departamento de Investigaciones Financieras de la Universidad del Servicio Fiscal Estatal de Ucrania.

Cómo citar
Padalka, A. (2022). Apoyo criminalístico forense y técnico en la investigación de la ciberdelincuencia: La lucha contra las ciberamenazas en Ucrania. Revista Científica General José María Córdova, 20(38), 407-423. https://doi.org/10.21830/19006586.901

Referencias bibliográficas

Abrhám, J., Britchenko, I., Jankovic, M., & Garškaite-Milvydiene, K. (2018). Energy security issues in contemporary Europe. Journal of Security and Sustainability Issues, 7(3), 387-398. https://doi.org/10.9770/jssi.2018.7.3(1)

Cellebrite. (2021). UFED Touch 2. https://www.cellebrite.com/en/ufed/

Civil Procedural Code of Ukraine. (2004). Law No. 1618-IV. Base “Legislation of Ukraine.” March 18, 2004. https://zakon.rada.gov.ua/laws/show/1618-15#Text

Code of Administrative Procedure of Ukraine. (2005). Law No. 2747-IV. Base “Legislation of Ukraine.” July 6, 2005. https://zakon.rada.gov.ua/laws/show/2747-15#Text

Commercial Procedural Code of Ukraine. (1991). Law No. 1798-XII. Base “Legislation of Ukraine.” November 6, 1991. https://zakon.rada.gov.ua/laws/show/1798-12#Text

Criminal Code of Ukraine. (2001). Law of Ukraine No. 2341-III. Article 361-1. https://zakon.rada.gov.ua/laws/show/2341-14#Text

Criminal Procedural Code of Ukraine. (2012a) Law of Ukraine No. 4651-VI. Article 4651-VI. https://zakon.rada.gov.ua/laws/show/4651-17#Text

Criminal Procedural Code of Ukraine. (2012b). Law of Ukraine No. 4651-VI. Base “Legislation of Ukraine.” April 13, 2012. https://zakon.rada.gov.ua/laws/show/4651-17#Text

Criminal Procedural Code of Ukraine. (2012c). Law of Ukraine No. 4651-VI. Code of Ukraine. May 20, 2012. https://zakon.rada.gov.ua/laws/show/4651-17#Text.

Daly, M.K. (2009). The Advanced Persistent Threat (or Informationized Force Operations). USENIX. https://static.usenix.org/event/lisa09/tech/slides/daly.pdf

EPOS. (2021a). EPOS BadDrive Adapter https://www.epos.ua/view.php/ua/products_epos_baddrive_adapter

EPOS. (2021b). EPOS BadDrive Adapter USB https://www.epos.ua/view.php/products_epos_baddrive_usb

EPOS. (2021c). EPOS WriteProtector. https://www.epos.ua/view.php/en/products_epos_write_protector

Guidance Software (2020a). Tableau T6es SAS Forensic Bridge. https://tableau.guidancesoftware.com/pdf/en/Tableau_T6es_Product_Brief.pdf

Guidance Software (2021b). Tableau Hardware T3458is. https://tableau.guidancesoftware.com/index.php?pageid=specs&xml=spec_t3458is.xml&model=T3458is

Guliyeva, A., Britchenko, I., & Rzayeva, U. (2018). Global security and economic asymmetry: A comparison of developed and developing countries. Journal of Security and Sustainability Issues, 7(4), 707-717. https://doi.org/10.9770/jssi.2018.7.4(8)

Inshyn, M., Vakhonieva, T., Korotkikh, A., Denysenko, A., & Dzhura, K. (2021). Transformation of labor legislation in the digital economy. InterEULawEast, 8(1), 39-56. https://doi.org/10.22598/iele.2021.8.1.3

Kozlovskyi, S., Butyrskyi, A., Poliakov, B., Bobkova, A., Lavrov, R., & Ivanyuta, N. (2019). Management and comprehensive assessment of the probability of bankruptcy of Ukrainian enterprises based on the methods of fuzzy sets theory. Problems and Perspectives in Management, 17(3), 370-381. https://doi.org/10.21511/ppm.17(3).2019.30

Law of Ukraine (1994). On forensic examination. No. 4038-XII. Article 7. February 25, 1994. https://zakon.rada.gov.ua/laws/show/4038-12#Text

Law of Ukraine. (2017) No. 2163-VIII. On the basic principles of cybersecurity in Ukraine. Article 8, part 2. https://zakon.rada.gov.ua/laws/show/2163-19#Text

Magnet Forensics. (2021). MAGNET AXIOM. https://www.magnetforensics.com/products/magnet-axiom/

Ministry of Justice of Ukraine. (1998). Instruction No. 53/5. Scientific and methodological recommendations on the preparation and appointment of forensic examinations and expert studies. https://zakon.rada.gov.ua/laws/show/z0705-98#Text.

Ministry of Justice of Ukraine. (2021). Transition Book: Mission and Responsibilities. https://www.pravojustice.eu/storage/app/uploads/public/5d7/f77/c88/5d7f77c88c23b147881339.pdf

MOBILedit. (2021). MOBILedit Forensic Express PRO. https://www.mobiledit.com/online-store/forensic-express

MSAB. (2021). XRY Mobile Forensics and Data Recovery Software. https://www.msab.com/product/xry-extract/

Nizovtsev, Yu.Yu. (2016). Forensic examination of signs of interference in the work of information and telecommunications systems by remote attacks on denial of service: guidelines. Kyiv: ArTek Publishing House.

Nizovtsev, Yu.Yu. (2018). Forensic examination of malicious software: guidelines. Kyiv: ArTek Publishing House.

President of Ukraine. (2021). Presidential Decree No. 447/2021. On the Cyber Security Strategy of Ukraine. Decision of the National Security and Defense Council of Ukraine. August 26, 2021. https://www.president.gov.ua/documents/4472021-40013

Russetskiy, A. A. (2018). Place of Forensic Science in the Cyberthreats Prevention System in Field of a Ukrainian Information Security. Theory and Practice of Forensic Science and Criminalistics, 18, 263-271. https://doi.org/10.32353/khrife.2018.29

Security Service of Ukraine. (2015). Request No. 371. On the Approval of the Instruction on Appointment and Conduct of Court Appraisals and Expert Surveys in the System of the Ukrainian Security Service. https://zakon.rada.gov.ua/laws/show/z0738-15

Ukraine Security Service, Order of the Central Department. (2020). Request No. 80. On approval of Amendments to the Regulation on the Security Service of Ukraine Expert-Qualification Commission and Certification of Court Experts. https://zakon.rada.gov.ua/laws/show/z0310-20#Text

WiebeTech. (2021a). Forensic UltraDock FUDv5.5 by CRU. https://www.cru-inc.com/products/wiebetech/forensic-ultradock-v5-5/

WiebeTech. (2021b). USB 3.0 WriteBlocker by CRU. https://www.cru-inc.com/products/wiebetech/usb-3-0-writeblocker/

X-Ways. (2021). X-Ways Forensics: Integrated Computer Forensics Software. http://www.x-ways.net/forensics/

Yaroshenko, O. M., Vapnyarchuk, N. M., Lozovoi, S. V., Yakovleva, G. O., & Yakovlyev, O. A. (2018). General-compulsory medical insurance: World experience. Journal of Advanced Research in Law and Economics, 9(5), 1829-1838. https://doi.org/10.14505//jarle.v9.5(35).38

Publicado
2022-04-01
Crossref Cited-by logo

Más sobre este tema