logo

Computer Forensics: Investigating Cyber Attacks and Digital Data

1. Explain your approach and investigation into the recent hacking of Baltimore's 9-1-1 system as the investigator and forensic examiner. 2. Explain your approach and investigation into a recent criminal investigation scenario using digital evidence. 3. Describe the usefulness of Facebook data for computer crime scene investigators in the context of the Facebook data scandal.

4 Pages729 Words272 Views
   

Added on  2023-06-12

About This Document

This article discusses the investigation of cyber attacks and digital data in computer forensics. It covers the Baltimore 911 system hack, the Wannacry virus attack, and the use of digital data for investigators. The article also suggests ways to identify the root cause of a hack and how to analyze the style of coding to narrow down attackers. The subject is computer forensics, and the course code and college/university are not mentioned.

Computer Forensics: Investigating Cyber Attacks and Digital Data

1. Explain your approach and investigation into the recent hacking of Baltimore's 9-1-1 system as the investigator and forensic examiner. 2. Explain your approach and investigation into a recent criminal investigation scenario using digital evidence. 3. Describe the usefulness of Facebook data for computer crime scene investigators in the context of the Facebook data scandal.

   Added on 2023-06-12

ShareRelated Documents
Computer Forensics
Computer Forensics
Your Name
Institution Name
Computer Forensics: Investigating Cyber Attacks and Digital Data_1
Computer Forensics
Baltimore’s 911 system hack
The 911 system works by routing the calls made by users to emergency responders who are
closest to a call. The 911 system has saved countless number of lives since its inception, and if
hindered, it could disable an entire state for an extended period of time. An attack termed as a
TDoS attack, or telephony denial of service attack infects a number of mobile phones to
autimatically make fake calls to 911, clogging call center ques. This prevents real users from
reaching the operators (Tan et.al, 2014).
The primary aim of an investigative officer in case of a 911 systems hack would be to
identify the route cause of the hack. As the majority of hacks occur due to Malware that infects
phones, it would be better to intially try and identify the Apps that conain Malware or Spyware.
Once the particular Malware has been identified, the next step would be to identify the phones
from which the calls have been arriving to the 911 facility. But this may be challenging for the
investigative officer, as the attacks are initiated through a set of commands via covert text
messages or the Internet. Steps could be taken to block the phones that repeatedly make the 911
calls using the ImternationalMobile Subscriber Identity (IMSI) number.
The Wannacry Virus attack on 2017
On May 2017 a virus called WannaCry that encrypts data on infected computers and
demands ransom payments to allow users access was released across the world. The WannaCry
virus predominantly attacked the NHS, which severely deterred its ability to provide care to the
patients.
The peculiar feature about WannaCry was that it spreads itself to an organization's
network by exploiting a vulnerability (Chen and Bridges, 2017). But it was difficult to determine
Computer Forensics: Investigating Cyber Attacks and Digital Data_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The WannaCry Ransomware: Concept, Impact, and Response
|13
|774
|175

Cyber Crime for New Threats of 2018 - Desklib
|6
|477
|389

Network security - Sample Assignment
|10
|2195
|122

Analysis of Ransomware
|139
|30604
|56

DDOS and Ransomware - Desklib
|4
|739
|285

Hacking and Cyber Warfare Assignment
|5
|912
|240