logo

Computer Crime and Digital Forensics Research 2022

Complete an investigation report for a digital forensic case, including evidence forms, description of forensic workstation, and explanation of hash values and image file access procedure.

16 Pages3539 Words20 Views
   

Added on  2022-09-27

Computer Crime and Digital Forensics Research 2022

Complete an investigation report for a digital forensic case, including evidence forms, description of forensic workstation, and explanation of hash values and image file access procedure.

   Added on 2022-09-27

ShareRelated Documents
TITLE: Computer Crime and Digital Forensics
Computer Crime and Digital Forensics
i
Computer Crime and Digital Forensics Research 2022_1
Executive Summary
Digital forensic is the rapidly growing field of investigations in the IT industry. Experts should be
able to collect the data, find evidence, collect the relevant evidence and also they should a team
inside of them are able to access all these steps using technology tools. By using the software, the
data in USB can be retrieved and also the viruses will be eliminated in the same case with the email.
All the malicious activities can be done just by the use of well build software to handle such issues
(Le‐Khac, Plunkett, Kechadi, & Chen, 2019). The research on the email clearly shows that it was
infected by the viruses. The emails can't be open with the normal software but after scanning using
Autopsy, the viruses can be seen. USB also contain sensitive financial files records of the balance
sheet. According to our investigations, the balance was found to mean he was planning to
manipulate the financial report of the company. In any investigation, acquiring evidence is the most
important part because no investigation will be carried if there is no evidence. The victim uses some
email to try and do crime because his contract was terminated and therefore the chance of him
trying to do the crime is very high. Also, USB found in his desk might be carrying some viruses
intended to infected computers or perhaps it contains stole files. Therefore, we will have to use legal
and ethics of judging and prosecuting digital crimes. We have all the evidence necessary for the
prosecution. We have also prepared a report which will be used as evidence against the victim.
ii
Computer Crime and Digital Forensics Research 2022_2
TABLE OF CONTENTS
Page
TITLE............................................................................................................................... ........i
EXECUTIVE SUMMARY .........................................................................................................ii
TABLE OF CONTENTS ..........................................................................................................iii
INTRODUCTION ........................................................................................................................ iv
CHAPTER
1. DIGITAL FORENSIC PROCEDURE
1.1. Evidence Form (Figure 1-11 of the text)........................................................1
1.2. Forensic Workstation and Image Downloading Procedure...................................1
1.3. Two SHA-based Hash Function................................................................. 2
1.4 Explanation of need for Multiple Hash Values ................................................3
1.5 Explanation of Procedure........................................................................4
2. DESCRIPTION OF BINARY DETAILS
2.1. Table 1: Properties of the Undeleted Files....................................................5
2.2. Description of Programs ........................................................................5
3. OUTCOMES OF DIGITAL FORENSIC INVESTIGATION
3.1. Description and Justification ..................................................................6
3.2. Document Procedure............................................................................6
3.3. Result and Conclusions....................................................10
4. LEGAL IMPLICATIONS
4.1.Cybercrime Act 2001 and Crimes 1958.............................................................1.1
4.2. Corporate or Criminal Investigation.................................................................11
References................................................................................................12
iii
Computer Crime and Digital Forensics Research 2022_3
Introduction
Cybercrime cases always shift because of the way technology is moving. When new cybercrime is
identified then new rules and regulations are set to strengthen the cybercrime laws. This intellectual
property troubles lawmakers because of how technical it is to set the rules and regulations. In most
cases, there is no clear or tangible proof of the theft because it is done in a magical way using
virtual environments. This problem, therefore, has given rise to new ways of process investigations
called IP forensic analysis. Investigative experts are assigned a task to perform valuations of
copyrights, patents, taxation, among others. Through digital forensics, investigations of a computer
have been dealt with accordingly (Moscato, Romeo, & Xhafa, 2019, February).
iv
Computer Crime and Digital Forensics Research 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensic
|9
|1804
|251

Digital Forensic Report for Exotic Mountain Tour Service
|15
|3192
|288

Digital Forensic Report for Exotic Mountain Tour Service
|12
|3002
|251

Computer Forensics: Investigation, Resources, and Tools
|57
|7403
|287

Digital Forensic Investigation
|10
|2304
|106

Digital Forensic: An Overview of the Application, Tools, and Future
|12
|572
|328