logo

Digital Forensics: Challenges and Trends

   

Added on  2020-03-16

12 Pages2983 Words38 Views
 | 
 | 
 | 
Running head: FORENSIC REPORTForensic ReportName of the StudentName of the UniversityAuthor Note
Digital Forensics: Challenges and Trends_1

2FORENSIC REPORTTable of ContentsExecutive Summary...................................................................................................................4Introduction................................................................................................................................4Scope Of Engagement:...............................................................................................................5Summary Of Findings................................................................................................................5Analysis......................................................................................................................................5Legal And Ethical Considerations.............................................................................................8Findings......................................................................................................................................9Conclusion...............................................................................................................................10References:...............................................................................................................................11
Digital Forensics: Challenges and Trends_2

3FORENSIC REPORTExecutive summaryThe rise of computer systems has witnessed new evidences available for anyinvestigator. They have been to seeking whether any offender has utilized the computersystems for facilitating the offences. However there lie various drawbacks though theevidences are present. The data volume is a challenge here. However as the users are turningto be more savvy, more sophisticated methods are found to make the life of the examinersharder. This is done through hiding and destroying the vital data. For instance the Google isquiet helpful to seek proofs leaving them away from any wrongdoing. On the other hand, theoperating systems and computers are highly complex systems. There have been variousexceptions for every process utilized to eradicate evidences. This it is still common for themethods not to become fully successful. The following article analyzes a case of theft ofintellectual property where the suspect was caught with false allegations of stealing electronicdocuments. IntroductionI have been appointed with case in which a large corporate entity had received aresignation letter from one of his senior employee who had decided to commence work witha competitor organization. He was much respected executive manager and exemplaryemployee within the organization. Similar to the other executives, he was also appointed withan external USB storage device for saving the documents related to the operational activitieswithin the organization. This member was reported to be working from outside the officepremises many times for which he needed to use a portable storage device for storing thoseinformation. “This executive was expected to work away from the office from time to timeand as a result, he needed the ability to have a portable storage device. This of itself was nocause for alarm for the business and was considered standard operating procedure”.
Digital Forensics: Challenges and Trends_3

4FORENSIC REPORTAfter resignation of the executive manager , the senior manager decided to review thelaptop computer of the executive as the matter of process and just wanted to crosscheck andconfirm whether the executive had sent any confidential and sensitive information to his newemployer or not. With the addition of this information he also wants to know if the executivehad stolen the data or manipulated the data unlawfully or not. He just wanted to confirm thathis data is safe and not any manipulation has been done to the data. Considering these facts an executive from the organization went to the executive’sapartment and collected the related equipments to the storage device and laptop computer inwhich he used to save the data and used to accomplish operational activities related to thework environment. Scope of Engagement:Following are the scope of the digital forensic investigation: I was provided with theexecutive’s laptop computer and the storage device that he was using all the time for thethoroughly forensic investigation. All the computers that were issued by the organizationwere based on Windows XP operating system using NTFS file system.Summary of FindingsThere were certain files relate to the organization that has been deleted after theexecutive senior had resigned to join the competitor organization and it is the probability thatthe executive senior had exchanged sensitive information with their employees.AnalysisThe investigation was started by examining the forensic image of the USB externaldevice that was recovered from the executive. It was noted that it was already formatted bythe executive date prior to the collection of devices and the forensic image was of no use asthere was not any user file stored in the drive. The process of formatting the external device
Digital Forensics: Challenges and Trends_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents