Features of the forensic methodology for investigating criminal attacks against the person committed using information and telecommunication networks