logo

Forensics and Incident Response (Electronic emails) ABSTRACT

   

Added on  2020-06-05

26 Pages7956 Words375 Views
 | 
 | 
 | 
Forensics and IncidentResponse (Electronic emails)
Forensics and Incident Response (Electronic emails) ABSTRACT_1

ABSTRACTAdvancement in technology is effective enough to protect people from the type ofcriminal activities that take place. However, it is identified that individuals get in trap of thepeople who are wan to harm or get money. The present research is conducted to determine themethods, procedure and tools for investigation applied by forensic companies for electronicemail. This is an area in which the research is carried as the rate of crime is increasingtremendously. So as to conduct the research, there are both primary and secondary methods thatare applied so that information with respect to the topic can be identified. More specifically, theresearcher has made use of interview from 5 of the exports of Forensic persons. They areselected as they have proper understanding about the research topic. From the researchconducted, it is identified that the lack of knowledge is the main cause due to which people get introuble or become the part of criminal case. In addition to this, forensic firms need to be frequentadvancement made towards technology so that they are able to identify the people behind thecrime conducted through email.
Forensics and Incident Response (Electronic emails) ABSTRACT_2

ContentsABSTRACT....................................................................................................................................2INTRODUCTION...........................................................................................................................1Background......................................................................................................................................2The crime that take place through electronic emails...................................................................3Procedures that are followed by digital forensic companies for investigating on crimes causedthrough electronic emails.............................................................................................................4Methods and tools that are used for Electronic emails by digital forensics company in UK......5Methodology....................................................................................................................................7Result and discussion.....................................................................................................................11Conclusion.....................................................................................................................................14REFERENCES..............................................................................................................................15APPENDIX 1.................................................................................................................................17APPENDIX 2.................................................................................................................................23Questionnaire from Forensic Experts........................................................................................23
Forensics and Incident Response (Electronic emails) ABSTRACT_3

INTRODUCTIONWith time there are different type of changes that has taken place with regard totechnology. There are many firms that have come up so that people can be protected from anytype of crime. With advancement in technology, it has also given raise to crime with the help ofdifferent type of electronic sources (Casey, 2011). In order to be better, firms make frequentchanges in their services and the type of technologies that are being used. Present research isfocused on forensic investigation in which analysis and gathering for the crime that are relatedwith physical evidence. This is done so that appropriate conclusion is determined through whichthe suspect can be found. There are different areas in which the investigators will look, itincludes fingerprints, hard drives, residue, computer or any other type of electronic technologiesthat are found at the crime scene. There are various type of tools that are used so that clues canbe found out and the suspect can be caught (Chung, Park and Kang, 2012). There are forensicscientists who collect analyse and preserve the evidence that are found during the investigationand are some of the scientists who travel to crime scenes and collect evidence themselves. Bothcivil and criminal cases are testified and they have the privilege to work defence or prosecution.When taking about ancient world, the rate of standardized forensic practices. Confessions tookplace so as to make the crimes done by people and they were punished (Nelson, Phillips andSteuart, 2014). However, with changes in time, there are many experts who aim at understandingthe case and focus on findings out clues that can help to catch the suspect. In the year 1248, there was first account of making use of entomology and medicine wereused so as to criminal cases. Later on there are many different type of advancement intechnology that formed many organization that work towards solving cases so that true personinvolved can be punished as their part in the crime (Hoog, 2011). Many different form of crimetake place and these areas are studied by different departments in forensic team. The presentresearch is focused conducting the research. People made use of tools that are helpful enough toconnect with other so that they are able to convey information. In this context, Email has becomea primary sources or means for connecting with others. Further, these are considered to be theeasy source of forged. Many crimes has been reported that are done with the help of emails. Inbusiness world, firms have develop their own email addresses so that they are able to track downthat interactions that are taken place between employees (Bryman and Bell, 2015). Further, thereare other emails like Yahoo, gmail, etc. in which there are many crimes that take place and it1
Forensics and Incident Response (Electronic emails) ABSTRACT_4

requires to have forensic team that can identify the crime that has taken place. To carry out theresearch in effective manner below given are the aim objectives:Aim: To investigate over recent method, procedures and tools used for Electronic emails by digitalforensics company in UK.Objectives: To identify the crime that take place through electronic emails.To determine the procedures that are followed by digital forensic companies forinvestigating on crimes caused through electronic emails.To understand the methods and tools that are used for Electronic emails by digitalforensics company in UK. To recommend way to reduce the rate of crime that take place through Electronic emailsat UK.BackgroundElectronic emails can be determined as sources that are used by people to connect withothers. All the crime that are performed by this sources fall under computer related crime orcyber-crime. As per cybercrimes, it can be defined as type of offences which are undertakenagainst groups or individuals who have criminal motive due to which people get affectednegatively. People in this modern world, aim at gaining money by any means (Garfinkel, 2010).For this process, it take different type of strategies so that people can be manipulated and trickedto get money. Further, there are cases in which the link that are send by the criminals whichwhen clicked, then their private information gets leaked. The fraud for email is the intentionaldeception that are made by a person to damage others or for personal gain. When the rate ofemail users increased, then it became means of defraud people. Further, this can also be taken asa form of scam or con game (Salehi and Alipour, 2010). Further, there are different forms ofstrategies that are applied by people in which they get to earn money. In this context, belowgiven are the some of the forms of crime that are conducted through emails:Spoofing: This is a type of process in which a person will pretend to be someone else,then it is known to be spoofing. As per Oliveira and Martins, (2011) there are number of waysthrough which spoofing take place. Among all these one of the common one is when actual2
Forensics and Incident Response (Electronic emails) ABSTRACT_5

sender’s origin of the message and the name are masked or concealed from the recipient. One ofthe type of spoofing is as follows:Phishing for data: There are some of the spoof that purport to be from existing companiesor from the firms that are already known to the victim (Rose, Hair and Clark, 2011). The main issend in form that asks for information from client in which it includes bank details that has to beconfirmed. This also includes development of new account or sharing of password. Bogus offers: This is a type of email solicitation is an attempted fraud in which interestamong people are developed by giving the offer of services or goods (Turvey, 2011). The pricesof the product or services are reduced or there are additional gifts that are given which enables todevelop interest among people. Request for help: In this type of email fraud, there are emotional mails are send in whichthe reader develops sympathy. People tent to send these people money. For example, people willask money for operation in order to cure cancer, etc. When there are emotional touch included,then it make clients to send some money so that they can overcome their problems. Where criminal activities that take place, then helps is taken from digital forensiccompanies so that they will be able to help to get back the money or to punish the person behindall these activities (Men and Tsai, 2012). The crime that take place through electronic emails.According to Wirtz, Schilke and Ullrich, (2010), online fraud and criminal activities arespreading like viral and interrupting the stability of societies across the globe. The online fraudsare classified among internet banking mobile banking, emails, cyber attack etc. the mostincreasing criminal activities are via emails which need to secured as the fraud in leading tomislead of confidential information (See-To and Ho, 2014). Further, it is turning important tospread awareness among society about emails which will help them to never respond to requestsfor personal details. Some email frauds/scams are extremely convincing which promotes theinternet criminal activities. Moreover, the hacking activities are increasing because it is quiteeasy access over information when the individual have cheat codes to break the passwords(Siponen, Pahnila and Mahmood, 2010). Besides, almost every person uses Microsoft softwarewhich is open to abuse and this the reason that the criminals have developed hacking a programcalled “The Backdoor” which enables them access over all Microsoft systems. According toScholar, organisational systems are difficult to hack because the management protect the3
Forensics and Incident Response (Electronic emails) ABSTRACT_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensics Analysis Report
|9
|2616
|38

The Negative Impact of CSI Shows on Society
|14
|3331
|736

The Impact of CSI Shows on Public Perceptions
|15
|3959
|279

Impact of CSI Shows on Society's Perception of Criminal Justice System
|14
|3319
|245

Computer Forensics: Investigation, Resources, and Tools
|57
|7403
|287

Digital forensic investigation PDF
|21
|2438
|167