logo

Digital Forensics

   

Added on  2023-06-15

19 Pages3879 Words415 Views
 | 
 | 
 | 
1
Running Head: Digital Forensics
Digital Forensics
Name
Course
Instructor
Date
Digital Forensics_1

2
Running Head: Digital Forensics
Hands-On Project 1-1
The following are some of the companies that have made major strides in providing digital
forensics services to both corporate and government institutions. Forensicon, now a QDiscovery
company(IT service management company) is one of the companies that has worked throughout
the United States of America and testified in several county, state and federal courts with regard
to computer forensics. They have undertaken projects such as investigations of company data
theft, investigations of wrongful activities from the employees, employment and commercial
litigation, expert witness testimonies on computer forensics and supplied affidavits together with
reports on computer forensics. Their core clients include law firms, software firms, financial
service institutions, non-profit organizations as well as the government (FORENSICON, 2018).
SS8 Networks, Inc. is another company that has provided forensics solutions in the cyber
security industry. Founded in 1994, the company has made major leaps over the years creating a
proven track record that has made it a company to be reckoned with. In the year 2016, they
launched one of their major creation that lies in the introduction of what is known as SS8
BreachDetect, a time machine that allows breach detection by going back and identifying the
devices-of-interest in a quest to find breaches, tracking and stopping them. Additionally, the
company makes use of SS8 sensors in monitoring flaws in high speed communication, thereby
producing High-Definition Records from the found flaws. By conducting monitoring and
interception, they can extract the metadata, reconstruct and analyze both voice and data with
utmost accuracy. Their sophistication in quality and capabilities has become the foundation for
some of the largest intelligence and law enforcement agencies that has helped the agencies
apprehend suspects-of-interest(SOI) in the communication service environment (SS8, 2018).
Digital Forensics_2

3
Running Head: Digital Forensics
Last in the list is a company known as AccessData. AccessData is a forensics company founded
in 1987 that has worked on providing forensics solutions for a long time in largescale. The
company has provided forensic solutions to government agencies, law firms and corporations by
understanding their collection and analysis needs of data. The company offers a range of
products and services from forensic toolkits to providing mobile solutions. One of their products,
MPE+ together with nFIELD allows the collection of phone contact information, call history,
location and recovery of deleted messages. With their revolutionary products, they are able to
perform duties such as risk compliance, collection and analysis and digital forensics. All these
are done at a cost-effective consideration (AcessData, 2018).
Similarities of the Aforementioned Forensics Companies
To start with, the three companies have depicted similarities in terms of the services they
provide. All of them are highly concerned with digital forensics solutions for their clients. All of
them take deep interest in risk compliance with the purpose of detecting and wiping out threats
before they occur. Secondly all the companies are similar with the type of frequent clients they
get, whom mostly are law firms, corporates and governments. Thirdly, all the companies appear
to have a widespread scale of operation. Lastly, at the end of their operations, they all deliver a
detailed analysis, reports and affidavits where applicable.
Differences in the Aforementioned Companies
The Forensicon company is inclined on providing witness testimonies and affidavits for
commercial and employment litigations on the person of interest. On the other hand, SS8
Networks are focused on providing monitoring methods for large communication service
Digital Forensics_3

4
Running Head: Digital Forensics
providers. Whereas AccessData are keen on providing products that their clients use for their
forensics purposes.
Hands-On Project 1-2
In 1995, the Australian government enacted offences regarding the wrong use of computers and
communication systems and online sexual abuse of children provided in the Criminal Code Act
1995 under the criminal law. This law has been used in several cases. For example, on July 2017
Nicholas Hunter(fictitious name) pleaded guilty to child pornography offences and was
sentenced in a county court in Melbourne (Common Director of Public Prosecutions, 2017).w
Additionally, the Cybercrime Act 2001 was enacted under the criminal law. The law introduced
computer related offences into the Criminal Code Act 1995. Some of the offences include denial
of service, hacking and malware intrusion. A case example is given by (Moor, 2014) where an
organized crime gang form Russia had hacked into Australian companies by placing malware in
several Australian companies that enabled them to acquire online banking information and
credentials thereby gaining power to move money to other accounts unauthorized. It is alleged
that the gang got away with $570 million.
One of the recent of the laws passed concerning computer crimes is one of identity fraud offence.
On 23 February 2009, the House of Representatives passed the law identity crimes and other
measures. These fraud offences are introduced into a part of the criminal code. Moreover, the
law contains a provision that allows the victim of a fraud offence to apply for a certificate from
the magistrate to show that their identity information has been misused, whom purpose is to clear
with financial institutions by removing fraudulent transaction history. One case that really caught
the eye was one of Nicholas Gaskin on August 2016. The accused was found guilty of tax fraud,
Digital Forensics_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents