Executive Summary Digital forensic is the rapidly growing field of investigations in the IT industry. Experts should be able to collect the data, find evidence, collect the relevant evidence and also they should a team inside of them are able to access all these steps using technology tools. By using the software, the data in USB can be retrieved and also the viruses will be eliminated in the same case with the email. All the malicious activities can be done just by the use of well build software to handle such issues (Le‐Khac, Plunkett, Kechadi, & Chen, 2019). The research on the email clearly shows that it was infected by the viruses. The emails can't be open with the normal software but after scanning using Autopsy, the viruses can be seen. USB also contain sensitive financial files records of the balance sheet. According to our investigations, the balance was found to mean he was planning to manipulate the financial report of the company. In any investigation, acquiring evidence is the most important part because no investigation will be carried if there is no evidence. The victim uses some email to try and do crime because his contract was terminated and therefore the chance of him trying to do the crime is very high. Also, USB found in his desk might be carrying some viruses intended to infected computers or perhaps it contains stole files. Therefore, we will have to use legal and ethics of judging and prosecuting digital crimes. We have all the evidence necessary for the prosecution. We have also prepared a report which will be used as evidence against the victim. ii
TABLE OF CONTENTS Page TITLE................................................................................................................…………... ……..i EXECUTIVE SUMMARY....................................................................................................…..ii TABLE OF CONTENTS.............................................................................................………….iii INTRODUCTION........................................................................................................................ iv CHAPTER 1.DIGITAL FORENSIC PROCEDURE 1.1.Evidence Form (Figure 1-11 of the text)………………………………………………..1 1.2.Forensic Workstation and Image Downloading Procedure….……….………………...1 1.3.Two SHA-based Hash Function…………………………………...………………….. 2 1.4Explanation of need for Multiple Hash Values ………………………………….……..3 1.5Explanation of Procedure…………………………………………….………………..4 2.DESCRIPTION OF BINARY DETAILS 2.1.Table 1: Properties of the Undeleted Files………………………….………………...5 2.2.Description of Programs …………………………………...………………………...5 3.OUTCOMES OF DIGITAL FORENSIC INVESTIGATION 3.1.Description and Justification ………………………………………….……………..6 3.2.Document Procedure……………………………………………………..…………..6 3.3.Result and Conclusions…………………………………………….10 4.LEGAL IMPLICATIONS 4.1.Cybercrime Act 2001 and Crimes 1958…………………………………………………….1.1 4.2. Corporate or Criminal Investigation…….………………………………………………….11 References……………………………………………………………………………………12 iii
Introduction Cybercrime cases always shift because of the way technology is moving. When new cybercrime is identified then new rules and regulations are set to strengthen the cybercrime laws. This intellectual property troubles lawmakers because of how technical it is to set the rules and regulations. In most cases, there is no clear or tangible proof of the theft because it is done in a magical way using virtual environments. This problem, therefore, has given rise to new ways of process investigations called IP forensic analysis. Investigative experts are assigned a task to perform valuations of copyrights, patents, taxation, among others. Through digital forensics, investigations of a computer have been dealt with accordingly (Moscato, Romeo, & Xhafa, 2019, February). iv
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
1. DIGITAL FORENSIC PROCEDURE 1.1.Evidence Form A Forensic image Investigation Case No:001Unit Number:50 Investigator: Nature of Case:A forensic image The location where evidence was obtained: Mr. Price Office Item # ID Description of evidenceVendor NameModel No/Serial No. 33135089CD-ROM hard disk5489 Evidence Recovered by: Mr. ElvisDate & Time:16thAugust 2019 Evidence Placed in Locker: Mr. Price OfficeDate & Time15thAugust 2019 Evidence Processed byDescription of EvidenceDate & Time Mr. ElvisHard disk foundDeleted data16thAugust 2019 Page __ of __< 1.2. Description of Forensic Workstation and Image Download Procedure Forensic workstations are always rebuilt, upgraded for a specific task, or hardware added to them to perform specific assigned work. All workstations are connected to only isolated forensic networks specifically made to give information on storage and printing facilities. It is always advisable to have workstation separate from the business network to enhance proper analysis by the Forensic experts. It will also give room to Forensic Laboratory for experts to work with adequate resources and to give proper analyzed data. In modern business, they will have a separate network to separate them from interference on the investigations (Englbrecht, Meier, & Pernul, 2019, pp. 87-97). Procedures Preparation Preparation is the most important thing to enhance good performances on the data analysis. An organization should have strict policies and measures which will allow experts to have proper procedures. Softwares for investigations must have a license in accordance with the law. An expert can, therefore, work properly with well-documented procedures and good environment (Xiao, Li, & Xu, 2019). 1
Collection This is a phase where all the evidence are collected by the forensic experts. This is the most critical stage since it involves collecting tangible evidence to assist in carrying out investigations. It can include hard-rives, images among others evidence (Panchal, Yagnik, & Sharma, 2019, pp. 401-408). Examination During this phase, experts examine the first respondents. It includes detecting hidden, obscured and encrypted data which are most important since they are required to provide an accurate and most honest report (Montasari, Hill, Carpenter, & Hosseinian-Far, 2019, pp. 169-209). Analysis Analysis phase, the incident is determined exactly. All data collected is interpreted here hence it the stage where it is determined whether the case is valid or not (Wong, Leung, New, & Ching, 2019, pp. 181-199). Reporting The report is a summarized work of all the investigations. All the procedures and notes take are well documented including all the discoveries and testimonies (Patel, & Sharma, 2019, pp. 447-456). 1.3.At Least Two SHA-based Hash Function Values of the ISO Image 1.3.1 Hash Cryptography Algorithm It is a one-way hash which is mathematical functions used to convert variable to a binary sequence of known length. It is impossible to reverse the process. It used when the 2 strings can produce the same hash value. It will be used to trace the ISO image (Montasari, Hill, Carpenter, & Montaseri, 2019, 52-60). 1.3.2 Secure Hash Algorithm (SHA) 512 This hash explains how the cryptography algorithm can receive input in message form then converts it to the 512-bit length message. This will help to find the ISO image on the hard-rive (Moscato, Romeo, & Xhafa, 2019, February, Vol. 29, p. 170). 2
1.4Verification by Hash Values Hashes are designed to produce a strong character. Strings are always fixed in length no matter the size the input data. They are used to confirm whether the files are legitimate. In Linux, you can confirm the ISO image whether it is in a good state or it has been tampered with. In digital forensics, we can employ hash then confirm whether the image we were investigating was in a good state (Maiorca, & Biggio, 2019, 63-71). 3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1.5Explanation of Procedure used Before Accessing Image File in VM Oracle VM VirtualBox is a tool which is cross-platform virtualization software that can be used in different operating systems. The user can run both Windows and Linux at the same time by use of this tool. It is simple to use but it also very powerful since it can run everywhere from small embedded systems to even cloud environments (Le‐Khac, Plunkett, Kechadi, & Chen, 2019). 4
2.DESCRIPTION OF BINARY DETAILS 2.1. Table 1: Properties of the Undeleted Files Found on the ISO Image File NamePhysical SizeMD5 Hash Disk My File Document Hard drive Hard drive Hard drive Ea335d560e6614f577c0fc349aebe18b 03d59e663c1af9ac33a9949d1193505a 10dc4332eafe9b8a5965a3ee22393fd9 2.2.Description of Programs to be used to Perform Investigation 2.2.1 Policy and Procedure Development Cybersecurity professionals really understand the impacts of data compromisation and therefore they really follow strict policies which govern the protection and securing against the malicious cybercriminals. Policies are what are not adhered to then everything will be a mess up and also proper procedure should always be followed which contacting digital forensic investigations for accurate and better results (Patel, & Sharma, 2019). 2.2.2 Evidence Assessment This is a key component to the investigation since potential cause and pieces of evidence of the cybercrime are really required. In our case, The victim was found the lost image, these are clear evidence that there is some malicious activities tried by the victim (Wong, Leung, New, & Ching, 2019). 2.2.3 Evidence Acquisition In any investigation, acquiring evidence is the most important part because no investigation will be carried if there is no evidence. The victim deleted two images and do crime because his contract was terminated and therefore the chance of him trying to do the crime is very high. Also, CD-ROM found in his desk might be carrying some viruses intended to infected computers or perhaps it contains stole files(Montasari, Hill, Carpenter, & Montaseri, 2019). 2.2.4 Evidence Examinations The final practical part of the investigation is to examine the possible evidence. The email that was suspicious has to be checked in details whether it contains the virus or any other software file which my launch cyber activities in the systems. CD-ROM also should be checked and confirmed what is inside so that a report to be prepared (Maiorca, & Biggio, 2019). 2.2.5 Documentation and Reporting This is the final part of the investigations. The data collected in all process should be detailed here for references and also the way forward (Xiao, Li, & Xu, 2019). 5
3. OUTCOMES OF DIGITAL FORENSIC INVESTIGATION 3.1.Description and Justification of Key Words Used to Search ISO Image Digital forensic experts evaluated all the possible Cybercrimes in a given task. The image deleted but it was not completely erased in the hard disk. If in case any malicious content is found in the email then the second step is to prevent from achieving its target. Also if in any case, it has already affected the targets then all the files and other important data should be recovered from such crime (Xiao, Li, & Xu, 2019). 3.2.Document Procedure Including Appropriate Commands and Screenshots 3.2.1 Evaluation of the Technology in digital forensics Digital forensic experts will evaluate all the possible cybercrimes in a given task. The email that was sent has to be scanned using special software designed to check the viruses and other malware activities. If in case any malicious content is found in the email then the second step is to prevent from achieving its target. Also if in any case, it has already affected the targets then all the files and other important data should be recovered from such crime (Xiao, Li, & Xu, 2019). 6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
3.2.2 Analysis of data on storage media and various file systems Analysis of the data on the storage media. In any investigation, acquiring evidence is the most important part because no investigation will be carried if there is no evidence. The victim uses some email to try and do crime because his contract was terminated and therefore the chance of him trying to do the crime is very high. Also, CD-ROM found in his desk might be carrying some viruses intended to infected computers or perhaps it contains stole files (Panchal, Yagnik, & Sharma, 2019). 7
3.2.3 Collecting of electronic evidence without compromising the original data In the CD-ROM found under the table, they have to carry out investigations. By use of cryptographic hash values then it will help us sort out the image. The final step is chain custody where they sign that the data and evidence material was collected from a client and that they are now under the investigations under the hands of the experts (Montasari, Hill, Carpenter, & Hosseinian-Far, 2019). 8
3.2.4 Technical tactics in digital crimes Digital forensic is the rapidly growing field of investigations in the IT industry. Experts should be able to collect the data, find evidence, collect the relevant evidence and also they should a team inside of them are able to access all these steps using technology tools. By using the software, the data in CD-ROM can be retrieved and also the viruses will be eliminated in the same case with the email. All the malicious activities can be done just by the use of well build software to handle such issues (Le‐Khac, Plunkett, Kechadi, & Chen, 2019). 9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
3.3.Details of Search Result and Conclusions Result Forensic workstations are always rebuilt, upgraded for a specific task, or hardware added to them to perform specific assigned work. All workstations are connected to only isolated forensic networks specifically made to give information on storage and printing facilities.Intellectual Property Investigation is applicable in both corporate and private entities. IP theft forensic is the best way to carry out this investigation. As by law, permissions must be granted by the corporate managers or CEO of a company to carry out this investigation because they are done in an almost similar way as the way hackers do. IP investigation also is very useful where a company may need to do some research in sales, clients problems, or competitors. Investigations will give the company way forward and this will lead to positive changes and results if the real issue is sought out (Moscato, Romeo, & Xhafa, 2019, February) Conclusions Digital forensic experts will evaluate all the possible cybercrimes in a given task. Experts should be able to collect the data, find evidence, collect the relevant evidence and also they should a team inside of them are able to access all these steps using technology tools. By using the software, the data in USB can be retrieved and also the viruses will be eliminated in the same case with the email. All the malicious activities can be done just by the use of well build software to handle such issues. The email that was sent has to be scanned using special software designed to check the viruses and other malware activities. If in case any malicious content is found in the email then the second step is to prevent from achieving its target. Also if in any case, it has already affected the targets then all the files and other important data should be recovered from such crime (Englbrecht, Meier, & Pernul, 2019). 10
4.0LEGAL IMPLICATIONS 4.1. One Violation and Justification Against Cybercrime Act 2001 and Crimes Act 1958 Intellectual Property Investigation is applicable in both corporate and private entities. IP theft forensic is the best way to carry out this investigation. As by law, permissions must be granted by the corporate managers or CEO of a company to carry out this investigation because they are done in an almost similar way as the way hackers do. IP investigation also is very useful where a company may need to do some research in sales, clients problems, or competitors. Investigations will give the company way forward and this will lead to positive changes and results if the real issue is sought out. Mr. Price was found guilty therefore appropriate measures should be taken. (Moscato, Romeo, & Xhafa, 2019, February). 4.2.Justification as to whether this Case is Best Pursued as a Corporate or Criminal Investigation During this phase, experts examine the first respondents. It includes detecting hidden, obscured and encrypted data which are most important since they are required to provide an accurate and most honest report.Analysis phase, the incident is determined exactly. All data collected is interpreted here hence it the stage where it is determined whether the case is valid or not Digital forensic is the rapidly growing field of investigations in the IT industry. Experts should be able to collect the data, find evidence, collect the relevant evidence and also they should a team inside of them are able to access all these steps using technology tools. By using the software, the data in USB can be retrieved and also the viruses will be eliminated in the same case with the email. All the malicious activities can be done just by the use of well build software to handle such issues (Le‐Khac, Plunkett, Kechadi, & Chen, 2019). 11
References Englbrecht, L., Meier, S., & Pernul, G. (2019). Toward a Capability Maturity Model for Digital Forensic Readiness. In Innovative Computing Trends and Applications (pp. 87-97). Springer, Cham. Montasari, R., Hill, R., Carpenter, V., & Montaseri, F. (2019). Digital Forensic Investigation of Social Media, Acquisition and Analysis of Digital Evidence. International Journal of Strategic Engineering (IJoSE), 2(1), 52-60. Wong, R. W., Leung, A. K., New, B., & Ching, S. (2019). Digital Forensic Investigation of the Xiyu Pagoda Lighthouse. In Digital Humanities and Scholarly Research Trends in the Asia-Pacific (pp. 181-199). IGI Global. Montasari, R., Hill, R., Carpenter, V., & Hosseinian-Far, A. (2019). The Standardised Digital Forensic Investigation Process Model (SDFIPM). In Blockchain and Clinical Trial (pp. 169-209). Springer, Cham. Xiao, J., Li, S., & Xu, Q. (2019). Video-based Evidence Analysis and Extraction in Digital Forensic Investigation. IEEE Access. Panchal, E. P., Yagnik, S. B., & Sharma, B. K. (2019). Use of Machine Learning Algorithm on File Metadata for Digital Forensic Investigation Process. In the Third International Congress on Information and Communication Technology (pp. 401-408). Springer, Singapore. Patel, P. C., & Sharma, B. K. (2019). An Advanced Approach of Aggregation and Archival of Digital Forensic Information on Windows-Based Environment. In the Third International Congress on Information and Communication Technology (pp. 447-456). Springer, Singapore. Moscato, F., Romeo, F., & Xhafa, F. (2019, February). A Hybrid Approach for Document Analysis in Digital Forensic Domain. In Advances in Internet, Data and Web Technologies: The 7th International Conference on Emerging Internet, Data and Web Technologies (EIDWT-2019) (Vol. 29, p. 170). Springer. Maiorca, D., & Biggio, B. (2019). Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware. IEEE Security & Privacy, 17(1), 63-71. Le‐Khac, N. A., Plunkett, J., Kechadi, M. T., & Chen, L. (2019). Digital Forensic Process and Model in the Cloud. Security, Privacy, and Digital Forensics in the Cloud, 239. 12