logo

Strict Digital Forensic Approach of Investigation

   

Added on  2020-03-16

9 Pages2616 Words38 Views
Digital ForensicsAbstractThe report presents a hypothetical case involving an employee working for an IT OEMcompany that is primarily into Networking Hardware and Solutions. The employee isbelieved to be have stolen data and sold it off to the open market. The report below follows astrict digital forensic approach of investigation and approaches the case in a phase by phasemanner while maintaining a proper chain of custody. 1
Strict Digital Forensic Approach of Investigation_1
Digital ForensicsTable of ContentsAbstract......................................................................................................................................1Introduction................................................................................................................................4Background................................................................................................................................4Scope of Engagement.................................................................................................................5Forensic Tools........................................................................................................................5Investigation Process..............................................................................................................5Overall File System....................................................................................................................7Email System Analysis..........................................................................................................7Documents Folder..................................................................................................................8Internet Browser Analysis......................................................................................................8Findings..................................................................................................................................8Conclusion.................................................................................................................................9References................................................................................................................................102
Strict Digital Forensic Approach of Investigation_2
Digital ForensicsIntroductionIn the past few years, an entirely new breed of crime scenes has erupted, one that happenselectronically within the cyber world. Traditional method of investigations, analysis andscrutiny does not apply in these new worlds. Therefore, a type of tool in the form a newdomain was invented and this is where Digital Forensics came into the picture. From violentcriminals, to terrorists and drug-lords and to even white-collar employees all are making useof technology to facilitate their offenses and also to avoid apprehension. Both organized andnon-organized criminal groups have entered the cyberspace. Internal part of an organizationor enterprise are no exception and this is exactly what happened in the case of the suspect inthis report. The report would provide a background of the case and then would go into detailabout the investigation process via forensic medium involving the tools to be used, theprocess to be followed including the analysis and detailed findings. BackgroundIn the scenario, the suspect is an employee of an IT company which deals in Networkingbased solution for Home and Business clients. The suspect plays are at designation of theteam lead. He had privilege to access sensitive data whose stealing can bring millions ofdollars losses to the company. This came into light when the company came to know that itsunique features which were not even released in the product so far, had already been capturedby its competitors who are had already released its product. The product had very closesimilarities with its product’s unique features which were still in development phase. Thecompany admitted that there has been an Intellectual Property theft either some externalintrusion or a leakage from an internal employee. On investigation, it was found that therehad been no recent external security breach. Hence, it came to this conclusion that there hasbeen an internal breach. On further internal investigation, it found that leakage is possible inthe research and development department. Further scrutinization revealed that some of theemployees had access to use USB drive and were also allowed to take them back to home.The investigation narrowed down to a single employee who had access to some confidentialdata of the company. The company was convinced that the employee had played a key role indata stealing and decide to catch him by showing a fake case and they were successful incatching them red-handed. Preliminary investigation found that he had indeed stole theconfidential information and might had also got the login credentials of other employees. The3
Strict Digital Forensic Approach of Investigation_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital forensic investigation PDF
|21
|2438
|167

San Zaw and Vasupongayya 2019
|18
|1141
|24

NIST CFReDS Project: Data Leakage Case Study
|104
|17475
|474

Digital Forensic Case Study: Investigating a Company Financial Fraud
|23
|3253
|98

Aadhaar Data Breach: Threats, Vulnerabilities, Legal and Ethical Issues, Consequences, Lessons Learned and Recommendations
|11
|2720
|311

Digital Forensic Report for Exotic Mountain Tour Service
|15
|3192
|288