Computer Crime Cases and Security Measures: A Forensic Investigation Report
VerifiedAdded on 2023/06/07
|20
|2748
|315
AI Summary
This report provides an overview of computer crime cases, necessary resources for forensic investigation, and detailed findings on security vulnerabilities of computer devices. It also reviews and reflects on the findings and suggests security measures to safeguard against computer criminal activities.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CASE INVESTIGATION REPORT
Case Investigation Report
SIT703: Advanced Digital Forensics
Name of the Student:
Student ID:
Name of the University:
Author’s note:
Case Investigation Report
SIT703: Advanced Digital Forensics
Name of the Student:
Student ID:
Name of the University:
Author’s note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CASE INVESTIGATION REPORT
Table of Contents
Introduction......................................................................................................................................2
1. Overview of the computer crime case.........................................................................................2
2. List of necessary resources for forensic investigation.................................................................4
3. Analysis of detailed findings.......................................................................................................4
4. Review and reflection on the findings.........................................................................................5
4.1 Review of findings.................................................................................................................5
4.2 Reflection on findings............................................................................................................6
Conclusion.......................................................................................................................................6
References........................................................................................................................................8
Appendix-Screenshots...................................................................................................................11
Table of Contents
Introduction......................................................................................................................................2
1. Overview of the computer crime case.........................................................................................2
2. List of necessary resources for forensic investigation.................................................................4
3. Analysis of detailed findings.......................................................................................................4
4. Review and reflection on the findings.........................................................................................5
4.1 Review of findings.................................................................................................................5
4.2 Reflection on findings............................................................................................................6
Conclusion.......................................................................................................................................6
References........................................................................................................................................8
Appendix-Screenshots...................................................................................................................11
2CASE INVESTIGATION REPORT
Introduction
The computer security is one of the most crucial aspects of developing the alignment of
the innovative technology (Taylor, Fritsch and Liederbach 2014). The formation of the computer
security features has been dependent on the alignment of the major crimes and thefts of the data
and information. The security vulnerabilities of the computer devices have increased with the
inclusion of internet facilities. The security operations for the computer devices would be
effectively aligned with the utilization management for protecting the computer criminal attacks.
The integration of security measures would be aligned for easing the formation of safeguard
from the computer criminal activities. The following assignment is a report on computer criminal
activities and the major factors that have formed the major setback for the execution of the
effective project execution. The growth of computer criminal activities has been largely
impacting on the completeness of the probable operations.
1. Overview of the computer crime case
The computer crime case has been growing since the last few years and it has rose to
considerable numbers. The attack on the integrity of the computer devices and systems has
resulted in forming major problems for the organization in executing their day to day activities.
Ransomware technology has provided the ease for the cyber criminals to access the information
unethically for their usage (Collins 2016). The new technologies, online banking, e-commerce,
and IoT devices have been largely attacked by the cyber criminals. Some of the biggest computer
crime cases are given below,
WannaCry: WannaCry is one of the biggest computer criminal case that shook entire
country along with many personnel all over the world (Mercaldo et al. 2016). The attack was
Introduction
The computer security is one of the most crucial aspects of developing the alignment of
the innovative technology (Taylor, Fritsch and Liederbach 2014). The formation of the computer
security features has been dependent on the alignment of the major crimes and thefts of the data
and information. The security vulnerabilities of the computer devices have increased with the
inclusion of internet facilities. The security operations for the computer devices would be
effectively aligned with the utilization management for protecting the computer criminal attacks.
The integration of security measures would be aligned for easing the formation of safeguard
from the computer criminal activities. The following assignment is a report on computer criminal
activities and the major factors that have formed the major setback for the execution of the
effective project execution. The growth of computer criminal activities has been largely
impacting on the completeness of the probable operations.
1. Overview of the computer crime case
The computer crime case has been growing since the last few years and it has rose to
considerable numbers. The attack on the integrity of the computer devices and systems has
resulted in forming major problems for the organization in executing their day to day activities.
Ransomware technology has provided the ease for the cyber criminals to access the information
unethically for their usage (Collins 2016). The new technologies, online banking, e-commerce,
and IoT devices have been largely attacked by the cyber criminals. Some of the biggest computer
crime cases are given below,
WannaCry: WannaCry is one of the biggest computer criminal case that shook entire
country along with many personnel all over the world (Mercaldo et al. 2016). The attack was
3CASE INVESTIGATION REPORT
based on the illegal access of the information related to health information and it resulted in
forming major operational issues for the people. Although the NHS was not specifically targeted,
the toll on the information integrity and security on hospitals, pharmacies, and surgeries were
very high. The attack has a specific ransomware that was of peculiar nature than other malwares
that attacked before May 2017 (Scaife et al. 2016). The ransomware had the ability to extract
information and it resulted in forming disruption for the execution of the probable execution of
the project information. The WannaCry ransomware was a pseudo-ransomware and it is possible
that the organization might face more attacks that can be disruptive to the functions and
destructive to the information in near future. WannaCry has made it evitable for the
organizations in probable listing the functions of security and forming major development. The
successful execution of the information security would be helpful for enclosing the probable
ransomware attacks and limiting their impacts on the organizations (Kharraz et al. 2016). It is
evident that the attack of WannaCry ransomware was a wakeup call to the global security and it
is possible that the security of the organizations would be strengthened in the near future.
Notpetya: Notpetya was another major ransomware that attacked and costed $300million
to Maersk (Kharraz et al. 2016). The company was a shipping giant and the attack by Notpetya
resulted in exhausting a serious damage to the APM terminals and Damco freight. The resultant
of the attack was increased congestion at the 76 ports due to the impact on the operational data
access. The ransomware had the ability to extract information and it resulted in forming
disruption for the execution of the probable execution of the project information. The Notpetya
ransomware was a pseudo-ransomware and it is possible that the organization might face more
attacks that can be disruptive to the functions and destructive to the information in near future.
Notpetya has made it evitable for the organizations in probable listing the functions of security
based on the illegal access of the information related to health information and it resulted in
forming major operational issues for the people. Although the NHS was not specifically targeted,
the toll on the information integrity and security on hospitals, pharmacies, and surgeries were
very high. The attack has a specific ransomware that was of peculiar nature than other malwares
that attacked before May 2017 (Scaife et al. 2016). The ransomware had the ability to extract
information and it resulted in forming disruption for the execution of the probable execution of
the project information. The WannaCry ransomware was a pseudo-ransomware and it is possible
that the organization might face more attacks that can be disruptive to the functions and
destructive to the information in near future. WannaCry has made it evitable for the
organizations in probable listing the functions of security and forming major development. The
successful execution of the information security would be helpful for enclosing the probable
ransomware attacks and limiting their impacts on the organizations (Kharraz et al. 2016). It is
evident that the attack of WannaCry ransomware was a wakeup call to the global security and it
is possible that the security of the organizations would be strengthened in the near future.
Notpetya: Notpetya was another major ransomware that attacked and costed $300million
to Maersk (Kharraz et al. 2016). The company was a shipping giant and the attack by Notpetya
resulted in exhausting a serious damage to the APM terminals and Damco freight. The resultant
of the attack was increased congestion at the 76 ports due to the impact on the operational data
access. The ransomware had the ability to extract information and it resulted in forming
disruption for the execution of the probable execution of the project information. The Notpetya
ransomware was a pseudo-ransomware and it is possible that the organization might face more
attacks that can be disruptive to the functions and destructive to the information in near future.
Notpetya has made it evitable for the organizations in probable listing the functions of security
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CASE INVESTIGATION REPORT
and forming major development. The successful execution of the information security would be
helpful for enclosing the probable ransomware attacks and limiting their impacts on the
organizations (Scaife et al. 2016). It is evident that the attack of Notpetya ransomware was a
wakeup call to the global security and it is possible that the security of the organizations would
be strengthened in the near future.
2. List of necessary resources for forensic investigation
The forensic investigation was done on the log file accumulated from the windows user
system folder. The information access and possible threats for the development had been done
for aligning the major factors of development. The online sources of educational websites and
research journals were used for completion of the forensic investigation on computer crime cases
and need of strong security functions. The following is the list of resources required for
necessary forensic investigation,
Article/Journal Name of the Authors Published by (Source)
Digital crime and digital terrorism Taylor, R.W., Fritsch,
E.J. and Liederbach, J.,
2014
Prentice Hall Press.
Cryptolock (and drop it): stopping
ransomware attacks on user data.
Scaife, N., Carter, H.,
Traynor, P. and Butler,
K.R., 2016
In Distributed Computing Systems
(ICDCS), 2016 IEEE 36th
International Conference on (pp.
303-312). IEEE.
Android forensics analysis: Private chat
on social messenger.
Satrya, G.B., Daely,
P.T. and Shin, S.Y.,
2016
In IEEE Conference Paper,
Research Gate.
Individual information security, user
behaviour and cyber victimisation: An
empirical study of social networking
users
Saridakis, G., Benson,
V., Ezingeard, J.N. and
Tennakoon, H., 2016
Technological Forecasting and
Social Change, 102, pp.320-330.
and forming major development. The successful execution of the information security would be
helpful for enclosing the probable ransomware attacks and limiting their impacts on the
organizations (Scaife et al. 2016). It is evident that the attack of Notpetya ransomware was a
wakeup call to the global security and it is possible that the security of the organizations would
be strengthened in the near future.
2. List of necessary resources for forensic investigation
The forensic investigation was done on the log file accumulated from the windows user
system folder. The information access and possible threats for the development had been done
for aligning the major factors of development. The online sources of educational websites and
research journals were used for completion of the forensic investigation on computer crime cases
and need of strong security functions. The following is the list of resources required for
necessary forensic investigation,
Article/Journal Name of the Authors Published by (Source)
Digital crime and digital terrorism Taylor, R.W., Fritsch,
E.J. and Liederbach, J.,
2014
Prentice Hall Press.
Cryptolock (and drop it): stopping
ransomware attacks on user data.
Scaife, N., Carter, H.,
Traynor, P. and Butler,
K.R., 2016
In Distributed Computing Systems
(ICDCS), 2016 IEEE 36th
International Conference on (pp.
303-312). IEEE.
Android forensics analysis: Private chat
on social messenger.
Satrya, G.B., Daely,
P.T. and Shin, S.Y.,
2016
In IEEE Conference Paper,
Research Gate.
Individual information security, user
behaviour and cyber victimisation: An
empirical study of social networking
users
Saridakis, G., Benson,
V., Ezingeard, J.N. and
Tennakoon, H., 2016
Technological Forecasting and
Social Change, 102, pp.320-330.
5CASE INVESTIGATION REPORT
3. Analysis of detailed findings
Taylor, Fritsch and Liederbach (2014) have stated that the security vulnerabilities of the
computer devices have increased with the inclusion of internet facilities. The attack on the
integrity of the computer devices and systems has resulted in forming major problems for the
organization in executing their day to day activities. Ransomware technology has provided the
ease for the cyber criminals to access the information unethically for their usage (Collins 2016).
The new technologies, online banking, e-commerce, and IoT devices have been largely attacked
by the cyber criminals. The attack was based on the illegal access of the information related to
health information and it resulted in forming major operational issues for the people. According
to Aggarwal, Arora and Ghai (2014), it is possible that the organization might face more attacks
that can be disruptive to the functions and destructive to the information in near future. Cyber
criminal attacks have made it evitable for the organizations in probable listing the functions of
security and forming major development. The successful execution of the information security
would be helpful for enclosing the probable ransomware attacks and limiting their impacts on the
organizations (Saridakis et al. 2016). The security operations for the computer devices would be
effectively aligned with the utilization management for protecting the computer criminal attacks.
Hui, Kim and Wang (2017) have explained that the integration of security measures would be
aligned for easing the formation of safeguard from the computer criminal activities. It is evident
that the existing security was a wakeup call to the global security and it is possible that the
security of the organizations would be strengthened in the near future. The ransomware had the
ability to extract information and it resulted in forming disruption for the execution of the
probable execution of the project information.
4. Review and reflection on the findings
3. Analysis of detailed findings
Taylor, Fritsch and Liederbach (2014) have stated that the security vulnerabilities of the
computer devices have increased with the inclusion of internet facilities. The attack on the
integrity of the computer devices and systems has resulted in forming major problems for the
organization in executing their day to day activities. Ransomware technology has provided the
ease for the cyber criminals to access the information unethically for their usage (Collins 2016).
The new technologies, online banking, e-commerce, and IoT devices have been largely attacked
by the cyber criminals. The attack was based on the illegal access of the information related to
health information and it resulted in forming major operational issues for the people. According
to Aggarwal, Arora and Ghai (2014), it is possible that the organization might face more attacks
that can be disruptive to the functions and destructive to the information in near future. Cyber
criminal attacks have made it evitable for the organizations in probable listing the functions of
security and forming major development. The successful execution of the information security
would be helpful for enclosing the probable ransomware attacks and limiting their impacts on the
organizations (Saridakis et al. 2016). The security operations for the computer devices would be
effectively aligned with the utilization management for protecting the computer criminal attacks.
Hui, Kim and Wang (2017) have explained that the integration of security measures would be
aligned for easing the formation of safeguard from the computer criminal activities. It is evident
that the existing security was a wakeup call to the global security and it is possible that the
security of the organizations would be strengthened in the near future. The ransomware had the
ability to extract information and it resulted in forming disruption for the execution of the
probable execution of the project information.
4. Review and reflection on the findings
6CASE INVESTIGATION REPORT
4.1 Review of findings
According to the study of the various sources of computer crime case, it has been evident
that the criminal activities using computer peripherals have increased to 2000% in the last 3
years of time (Chang, Zhong and Grabosky 2018). The organization might face more attacks that
can be disruptive to the functions and destructive to the information in near future. The
successful execution of the information security would be helpful for enclosing the probable
computer attacks and limiting their impacts on the organizations. It is evident that the attacks
were a wakeup call to the global security and it is possible that the security of the organizations
would be strengthened in the near future. The attacks were futile and it resulted in forming major
problems for the organization in executing the execution of the projects. The allocation of the
probable alignment of the improved security is required for ensuring the success of the
information integrity and development. The attacks have become futile for the organizations and
individuals (Ghernaouti-Helie 2016). The probable factors have also resulted in forming major
setback for the implication and development process. The implementation management would be
successfully implied for easing the information access and gain using the information accessing
and development.
4.2 Reflection on findings
I carried on the study of the probable execution and development of the security threats
that had impacted on the operations and functions of various organizations. The formation of the
computer security features had been dependent on the alignment of the major crimes and thefts
of the data and information. I came to know that security vulnerabilities of the computer devices
had increased with the inclusion of internet facilities. The security operations for the computer
4.1 Review of findings
According to the study of the various sources of computer crime case, it has been evident
that the criminal activities using computer peripherals have increased to 2000% in the last 3
years of time (Chang, Zhong and Grabosky 2018). The organization might face more attacks that
can be disruptive to the functions and destructive to the information in near future. The
successful execution of the information security would be helpful for enclosing the probable
computer attacks and limiting their impacts on the organizations. It is evident that the attacks
were a wakeup call to the global security and it is possible that the security of the organizations
would be strengthened in the near future. The attacks were futile and it resulted in forming major
problems for the organization in executing the execution of the projects. The allocation of the
probable alignment of the improved security is required for ensuring the success of the
information integrity and development. The attacks have become futile for the organizations and
individuals (Ghernaouti-Helie 2016). The probable factors have also resulted in forming major
setback for the implication and development process. The implementation management would be
successfully implied for easing the information access and gain using the information accessing
and development.
4.2 Reflection on findings
I carried on the study of the probable execution and development of the security threats
that had impacted on the operations and functions of various organizations. The formation of the
computer security features had been dependent on the alignment of the major crimes and thefts
of the data and information. I came to know that security vulnerabilities of the computer devices
had increased with the inclusion of internet facilities. The security operations for the computer
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7CASE INVESTIGATION REPORT
devices had been effectively aligned with the utilization management for protecting the computer
criminal attacks. The integration of security measures had been aligned for easing the formation
of safeguard from the computer criminal activities. My study was based on the use of the various
online resources and secondary data for understanding the prospects of communication
development and execution.
Conclusion
It can be concluded that the various computer cases have been resulted due to the lack of
information about the safety practices and the probable factors of increased cyber criminal
activities. The computer security was one of the most crucial aspects of developing the alignment
of the innovative technology. The formation of the computer security features had been
dependent on the alignment of the major crimes and thefts of the data and information. The
security vulnerabilities of the computer devices had increased with the inclusion of internet
facilities. The security operations for the computer devices had been effectively aligned with the
utilization management for protecting the computer criminal attacks. The integration of security
measures had been aligned for easing the formation of safeguard from the computer criminal
activities. The following assignment was a report on computer criminal activities and the major
factors that had formed the major setback for the execution of the effective project execution.
The growth of computer criminal activities had been largely impacting on the completeness of
the probable operations.
devices had been effectively aligned with the utilization management for protecting the computer
criminal attacks. The integration of security measures had been aligned for easing the formation
of safeguard from the computer criminal activities. My study was based on the use of the various
online resources and secondary data for understanding the prospects of communication
development and execution.
Conclusion
It can be concluded that the various computer cases have been resulted due to the lack of
information about the safety practices and the probable factors of increased cyber criminal
activities. The computer security was one of the most crucial aspects of developing the alignment
of the innovative technology. The formation of the computer security features had been
dependent on the alignment of the major crimes and thefts of the data and information. The
security vulnerabilities of the computer devices had increased with the inclusion of internet
facilities. The security operations for the computer devices had been effectively aligned with the
utilization management for protecting the computer criminal attacks. The integration of security
measures had been aligned for easing the formation of safeguard from the computer criminal
activities. The following assignment was a report on computer criminal activities and the major
factors that had formed the major setback for the execution of the effective project execution.
The growth of computer criminal activities had been largely impacting on the completeness of
the probable operations.
8CASE INVESTIGATION REPORT
References
Aggarwal, P., Arora, P. and Ghai, R., 2014. Review on cyber crime and security. International
Journal of Research in Engineering and Applied Sciences, 2(1), pp.48-51.
Al Mutawa, N., Bryce, J., Franqueira, V.N. and Marrington, A., 2015, August. Behavioural
evidence analysis applied to digital forensics: an empirical analysis of child pornography cases
using P2P networks. In Availability, Reliability and Security (ARES), 2015 10th International
Conference on (pp. 293-302). IEEE.
Chang, L.Y., Zhong, L.Y. and Grabosky, P.N., 2018. Citizen co‐production of cyber security:
Self‐help, vigilantes, and cybercrime. Regulation & Governance, 12(1), pp.101-114.
Collins, A., 2016. Contemporary security studies. Oxford university press.
Cummins Flory, T.A., 2016. Digital forensics in law enforcement: A needs based analysis of
Indiana agencies. Journal of Digital Forensics, Security and Law, 11(1), p.4.
Dilek, S., Çakır, H. and Aydın, M., 2015. Applications of artificial intelligence techniques to
combating cyber crimes: A review. arXiv preprint arXiv:1502.03552.
Ghernaouti-Helie, S., 2016. Cyber power: crime, conflict and security in cyberspace. EPFL
Press.
Hui, K.L., Kim, S.H. and Wang, Q.H., 2017. Cybercrime deterrence and international legislation:
evidence from distributed denial of service attacks. Mis Quarterly, 41(2), p.497.
Kester, Quist-Aphetsi, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, and Nii
Narku Quaynor. "Feature Based Cryptanalytic Technique for Digital Forensics Analysis of
References
Aggarwal, P., Arora, P. and Ghai, R., 2014. Review on cyber crime and security. International
Journal of Research in Engineering and Applied Sciences, 2(1), pp.48-51.
Al Mutawa, N., Bryce, J., Franqueira, V.N. and Marrington, A., 2015, August. Behavioural
evidence analysis applied to digital forensics: an empirical analysis of child pornography cases
using P2P networks. In Availability, Reliability and Security (ARES), 2015 10th International
Conference on (pp. 293-302). IEEE.
Chang, L.Y., Zhong, L.Y. and Grabosky, P.N., 2018. Citizen co‐production of cyber security:
Self‐help, vigilantes, and cybercrime. Regulation & Governance, 12(1), pp.101-114.
Collins, A., 2016. Contemporary security studies. Oxford university press.
Cummins Flory, T.A., 2016. Digital forensics in law enforcement: A needs based analysis of
Indiana agencies. Journal of Digital Forensics, Security and Law, 11(1), p.4.
Dilek, S., Çakır, H. and Aydın, M., 2015. Applications of artificial intelligence techniques to
combating cyber crimes: A review. arXiv preprint arXiv:1502.03552.
Ghernaouti-Helie, S., 2016. Cyber power: crime, conflict and security in cyberspace. EPFL
Press.
Hui, K.L., Kim, S.H. and Wang, Q.H., 2017. Cybercrime deterrence and international legislation:
evidence from distributed denial of service attacks. Mis Quarterly, 41(2), p.497.
Kester, Quist-Aphetsi, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, and Nii
Narku Quaynor. "Feature Based Cryptanalytic Technique for Digital Forensics Analysis of
9CASE INVESTIGATION REPORT
Visual Cryptographic Digital Image Data Based on Formal Concept Analysis." In Proceedings of
the International Conference on Foundations of Computer Science (FCS), p. 40. The Steering
Committee of The World Congress in Computer Science, Computer Engineering and Applied
Computing (WorldComp), 2015.
Kharraz, A., Arshad, S., Mulliner, C., Robertson, W.K. and Kirda, E., 2016, August. UNVEIL:
A Large-Scale, Automated Approach to Detecting Ransomware. In USENIX Security
Symposium (pp. 757-772).
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L. and Kirda, E., 2015, July. Cutting the
gordian knot: A look under the hood of ransomware attacks. In International Conference on
Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 3-24). Springer, Cham.
Mercaldo, F., Nardone, V., Santone, A. and Visaggio, C.A., 2016, June. Ransomware steals your
phone. formal methods rescue it. In International Conference on Formal Techniques for
Distributed Objects, Components, and Systems (pp. 212-221). Springer, Cham.
Saridakis, G., Benson, V., Ezingeard, J.N. and Tennakoon, H., 2016. Individual information
security, user behaviour and cyber victimisation: An empirical study of social networking
users. Technological Forecasting and Social Change, 102, pp.320-330.
Satrya, G.B., Daely, P.T. and Shin, S.Y., 2016, July. Android forensics analysis: Private chat on
social messenger. In IEEE Conference Paper, Research Gate.
Scaife, N., Carter, H., Traynor, P. and Butler, K.R., 2016, June. Cryptolock (and drop it):
stopping ransomware attacks on user data. In Distributed Computing Systems (ICDCS), 2016
IEEE 36th International Conference on (pp. 303-312). IEEE.
Visual Cryptographic Digital Image Data Based on Formal Concept Analysis." In Proceedings of
the International Conference on Foundations of Computer Science (FCS), p. 40. The Steering
Committee of The World Congress in Computer Science, Computer Engineering and Applied
Computing (WorldComp), 2015.
Kharraz, A., Arshad, S., Mulliner, C., Robertson, W.K. and Kirda, E., 2016, August. UNVEIL:
A Large-Scale, Automated Approach to Detecting Ransomware. In USENIX Security
Symposium (pp. 757-772).
Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L. and Kirda, E., 2015, July. Cutting the
gordian knot: A look under the hood of ransomware attacks. In International Conference on
Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 3-24). Springer, Cham.
Mercaldo, F., Nardone, V., Santone, A. and Visaggio, C.A., 2016, June. Ransomware steals your
phone. formal methods rescue it. In International Conference on Formal Techniques for
Distributed Objects, Components, and Systems (pp. 212-221). Springer, Cham.
Saridakis, G., Benson, V., Ezingeard, J.N. and Tennakoon, H., 2016. Individual information
security, user behaviour and cyber victimisation: An empirical study of social networking
users. Technological Forecasting and Social Change, 102, pp.320-330.
Satrya, G.B., Daely, P.T. and Shin, S.Y., 2016, July. Android forensics analysis: Private chat on
social messenger. In IEEE Conference Paper, Research Gate.
Scaife, N., Carter, H., Traynor, P. and Butler, K.R., 2016, June. Cryptolock (and drop it):
stopping ransomware attacks on user data. In Distributed Computing Systems (ICDCS), 2016
IEEE 36th International Conference on (pp. 303-312). IEEE.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10CASE INVESTIGATION REPORT
Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice
Hall Press.
Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice
Hall Press.
11CASE INVESTIGATION REPORT
Appendix-Screenshots
Appendix-Screenshots
12CASE INVESTIGATION REPORT
.
.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13CASE INVESTIGATION REPORT
14CASE INVESTIGATION REPORT
15CASE INVESTIGATION REPORT
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16CASE INVESTIGATION REPORT
17CASE INVESTIGATION REPORT
18CASE INVESTIGATION REPORT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19CASE INVESTIGATION REPORT
1 out of 20
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.