logo

Computer Crime Cases and Security Measures: A Forensic Investigation Report

   

Added on  2023-06-07

20 Pages2748 Words315 Views
Running head: CASE INVESTIGATION REPORT
Case Investigation Report
SIT703: Advanced Digital Forensics
Name of the Student:
Student ID:
Name of the University:
Author’s note:

1CASE INVESTIGATION REPORT
Table of Contents
Introduction......................................................................................................................................2
1. Overview of the computer crime case.........................................................................................2
2. List of necessary resources for forensic investigation.................................................................4
3. Analysis of detailed findings.......................................................................................................4
4. Review and reflection on the findings.........................................................................................5
4.1 Review of findings.................................................................................................................5
4.2 Reflection on findings............................................................................................................6
Conclusion.......................................................................................................................................6
References........................................................................................................................................8
Appendix-Screenshots...................................................................................................................11

2CASE INVESTIGATION REPORT
Introduction
The computer security is one of the most crucial aspects of developing the alignment of
the innovative technology (Taylor, Fritsch and Liederbach 2014). The formation of the computer
security features has been dependent on the alignment of the major crimes and thefts of the data
and information. The security vulnerabilities of the computer devices have increased with the
inclusion of internet facilities. The security operations for the computer devices would be
effectively aligned with the utilization management for protecting the computer criminal attacks.
The integration of security measures would be aligned for easing the formation of safeguard
from the computer criminal activities. The following assignment is a report on computer criminal
activities and the major factors that have formed the major setback for the execution of the
effective project execution. The growth of computer criminal activities has been largely
impacting on the completeness of the probable operations.
1. Overview of the computer crime case
The computer crime case has been growing since the last few years and it has rose to
considerable numbers. The attack on the integrity of the computer devices and systems has
resulted in forming major problems for the organization in executing their day to day activities.
Ransomware technology has provided the ease for the cyber criminals to access the information
unethically for their usage (Collins 2016). The new technologies, online banking, e-commerce,
and IoT devices have been largely attacked by the cyber criminals. Some of the biggest computer
crime cases are given below,
WannaCry: WannaCry is one of the biggest computer criminal case that shook entire
country along with many personnel all over the world (Mercaldo et al. 2016). The attack was

3CASE INVESTIGATION REPORT
based on the illegal access of the information related to health information and it resulted in
forming major operational issues for the people. Although the NHS was not specifically targeted,
the toll on the information integrity and security on hospitals, pharmacies, and surgeries were
very high. The attack has a specific ransomware that was of peculiar nature than other malwares
that attacked before May 2017 (Scaife et al. 2016). The ransomware had the ability to extract
information and it resulted in forming disruption for the execution of the probable execution of
the project information. The WannaCry ransomware was a pseudo-ransomware and it is possible
that the organization might face more attacks that can be disruptive to the functions and
destructive to the information in near future. WannaCry has made it evitable for the
organizations in probable listing the functions of security and forming major development. The
successful execution of the information security would be helpful for enclosing the probable
ransomware attacks and limiting their impacts on the organizations (Kharraz et al. 2016). It is
evident that the attack of WannaCry ransomware was a wakeup call to the global security and it
is possible that the security of the organizations would be strengthened in the near future.
Notpetya: Notpetya was another major ransomware that attacked and costed $300million
to Maersk (Kharraz et al. 2016). The company was a shipping giant and the attack by Notpetya
resulted in exhausting a serious damage to the APM terminals and Damco freight. The resultant
of the attack was increased congestion at the 76 ports due to the impact on the operational data
access. The ransomware had the ability to extract information and it resulted in forming
disruption for the execution of the probable execution of the project information. The Notpetya
ransomware was a pseudo-ransomware and it is possible that the organization might face more
attacks that can be disruptive to the functions and destructive to the information in near future.
Notpetya has made it evitable for the organizations in probable listing the functions of security

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Case Investigation Report for Advanced Digital Forensics - Desklib
|20
|2784
|380

Case Investigation Report for Advanced Digital Forensics - Desklib
|23
|3020
|454

Cyber Security WannCry Attack Case Study 2022
|11
|2314
|16

Cyber Crime: WannaCry Attack on NHS
|10
|2252
|2

Application of Ethical Theory Case Study: Ransomware Cyber attack
|7
|1574
|313

Computer Security Report 2022
|14
|3515
|48