Digital Forensic

Verified

Added on  2023/03/31

|9
|1804
|251
AI Summary
Digital forensic is the rapidly growing field of investigations in IT industry. Experts should be able to collect the data, find evidence, collect the relevant evidence and also they should a team inside of them are able to access all this steps using technology tools. By using of the software, the data in USB can be retrieved and also the viruses will be eliminated same case with the email. All the malicious activities can be done just by use of well build software to handle such issues. The email that was send has to be scanned using special software designed to check the viruses and other malware activities. If in case any malicious content is found in the email then the second step is to prevent from achieving its target. Also if in any case it has already affected the targets then all the files and other important data should be recovered from such crime.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
TITLE: DIGITAL FORENSIC
Digital Forensic
i

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Executive Summary
Digital forensic is the rapidly growing field of investigations in IT industry. Experts should be able
to collect the data, find evidence, collect the relevant evidence and also they should a team inside of
them are able to access all this steps using technology tools. By using of the software, the data in
USB can be retrieved and also the viruses will be eliminated same case with the email. All the
malicious activities can be done just by use of well build software to handle such issues (Le‐Khac,
Plunkett, Kechadi, & Chen, 2019). The research on the email clearly shows that it was infected by
the viruses. The emails can’t be open with the normal software but after scanning using Autospy,
the viruses can be seen. USB also contain sensitive financial files records of the balance sheet.
According to our investigations the balance was found to mean he was planning to manipulate the
financial report of the company. In any investigation, acquiring evidence is the most important part
because no investigation will be carried if there is no evidence. The victim use some email to try
and do crime because his contract was terminated and therefore the chance of him trying to do
crime is very high. Also USB found in his desk might be carrying some viruses intended to infected
computers or perhaps it contain stole files. Therefore, we will have to use legal and ethics of
judging and prosecuting digital crimes. We have all the evidence necessary for the prosecution. We
have also prepared report which will be used as evidence against the victim.
ii
Document Page
TABLE OF CONTENTS
Page
TITLE................................................................................................................…………... ……..i
EXECUTIVE SUMMARY ....................................................................................................…..ii
TABLE OF CONTENTS .............................................................................................………….iii
INTRODUCTION ........................................................................................................................ iv
CHAPTER
Intellectual Property Investigation.........................................................…………………….1
Legal and Ethical for investigating and prosecuting digital crimes ................……………...1
How to formulate a digital forensics process……………………………………………….1
Evaluation of the Technology in digital forensics …………...……………………………..3
Analysis of data on storage media and various file systems...................…………………...3
Collecting of electronic evidence without compromising the original data.....…………...3
Technical tactics in digital crime…………………………………………………………..3
Conclusion………………………………………………………………………………………4
Reference………………………………………………………………………………………...5
iii
Document Page
Introduction
Cybercrime cases always shift because of the way technology is moving. When new cybercrime is
identified then new rules and regulations are set to strengthen the cybercrime laws. This intellectual
property troubles lawmakers because of how technical it is to set the rules and regulations. In most
cases there is no clear or tangible proof of the the theft because it is done in a magical way using
virtual environments. This problem therefore has given rise to a new ways of process investigations
called IP forensic analysis. Investigative experts are assigned a task to perform valuations of
copyrights, patents, taxation, among others. Through digital forensic, investigations of computer has
been dealt with accordingly (Moscato, Romeo, & Xhafa, 2019, February).
iv

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Intellectual Property Investigation
Intellectual Property Investigation is applicable in both corporate and private entities. IP theft
forensic is the best way to carry out this investigations. As by law, permissions must be granted by
the corporate managers or CEO of a company to carry out this investigations because they are done
in almost similar way as the way hackers do. IP investigation also is very useful where a company
my need to do some research in sales, clients problems, or competitors. Investigations will gives the
company way forward and this will lead to positive changes and results if the real issue is sought
out (Moscato, Romeo, & Xhafa, 2019, February).
Legal and Ethical for investigating and prosecuting digital crimes
The digital forensic professions have tried their best to provide framework code which is ethics.
These are the core values and principles of how this forensic should be respected and honored.
When carrying out an investigation, this ethics should always be followed because this are legal and
the malicious attackers can be punished by use of this frameworks (Patel, & Sharma, 2019).
How to formulate a digital forensics process
1) Policy and Procedure Development
Cybersecurity professionals really understands the impacts of data compromization and therefore
they really follow strictly policies which governs the protection and securing against the malicious
cyber criminals. Policies is what are not adared to then everything will be a mess up and also proper
procedure should always be followed which contacting digital forensic investigations for accurate
and better results (Patel, & Sharma, 2019).
2) Evidence Assessment
This is a key component to the investigation since potential cause and evidences of the cyber crime
are really required. In our case, The victim was found with some suspicious emails sends to some
clients, these are clear evidence that there is some malicious activities tried by the victim (Wong,
Leung, New, & Ching, 2019).
3) Evidence Acquisition
In any investigation, acquiring evidence is the most important part because no investigation will be
carried if there is no evidence. The victim use some email to try and do crime because his contract
was terminated and therefore the chance of him trying to do crime is very high. Also USB found in
his desk might be carrying some viruses intended to infected computers or perhaps it contain stole
files (Montasari, Hill, Carpenter, & Montaseri, 2019).
4) Evidence Examinations
The final practical part of the investigation is to examine the possible evidence. The email that was
suspicious has to be checked in details whether it contains the virus or any other software file which
my launch cyber activities in the systems. USB also should be checked and confirmed what is
inside so that a report to be prepared (Maiorca, & Biggio, 2019).
1
Document Page
5) Documentation and Reporting
This is the final part of the investigations. The data collected in all process should be detailed here
for references and also the way forward (Xiao, Li, & Xu, 2019).
2
Document Page
Evaluation of the Technology in digital forensics
Digital forensic experts will evaluate all the possible cyber crimes in a given task. The email that
was send has to be scanned using special software designed to check the viruses and other malware
activities. If in case any malicious content is found in the email then the second step is to prevent
from achieving its target. Also if in any case it has already affected the targets then all the files and
other important data should be recovered from such crime (Xiao, Li, & Xu, 2019).
Analysis of data on storage media and various file systems
Analysis of the data on the storage media. In any investigation, acquiring evidence is the most
important part because no investigation will be carried if there is no evidence. The victim use some
email to try and do crime because his contract was terminated and therefore the chance of him
trying to do crime is very high. Also USB found in his desk might be carrying some viruses
intended to infected computers or perhaps it contain stole files (Panchal, Yagnik, & Sharma, 2019).
Collecting of electronic evidence without compromising the original data
In the USB found under the table, they have to carry out investigations. By use of cryptographic
hash values then it will help us sort out the image. The final step is chain custody where they sign
that the data and evidence material was collect from client and that they are now under the
investigations under the hands of the experts (Montasari, Hill, Carpenter, & Hosseinian-Far, 2019).
Technical tactics in digital crimes
Digital forensic is the rapidly growing field of investigations in IT industry. Experts should be able
to collect the data, find evidence, collect the relevant evidence and also they should a team inside of
them are able to access all this steps using technology tools. By using of the software, the data in
USB can be retrieved and also the viruses will be eliminated same case with the email. All the
malicious activities can be done just by use of well build software to handle such issues (Le‐Khac,
Plunkett, Kechadi, & Chen, 2019).
3

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Conclusion
Digital forensic experts will evaluate all the possible cyber crimes in a given task. Experts should be
able to collect the data, find evidence, collect the relevant evidence and also they should a team
inside of them are able to access all this steps using technology tools. By using of the software, the
data in USB can be retrieved and also the viruses will be eliminated same case with the email. All
the malicious activities can be done just by use of well build software to handle such issues. The
email that was send has to be scanned using special software designed to check the viruses and
other malware activities. If in case any malicious content is found in the email then the second step
is to prevent from achieving its target. Also if in any case it has already affected the targets then all
the files and other important data should be recovered from such crime (Englbrecht, Meier, &
Pernul, 2019).
4
Document Page
Reference
1.Englbrecht, L., Meier, S., & Pernul, G. (2019). Toward a Capability Maturity Model for Digital
Forensic Readiness. In Innovative Computing Trends and Applications (pp. 87-97). Springer, Cham.
2. Montasari, R., Hill, R., Carpenter, V., & Montaseri, F. (2019). Digital Forensic Investigation of
Social Media, Acquisition and Analysis of Digital Evidence. International Journal of Strategic
Engineering (IJoSE), 2(1), 52-60.
3. Wong, R. W., Leung, A. K., New, B., & Ching, S. (2019). Digital Forensic Investigation of the
Xiyu Pagoda Lighthouse. In Digital Humanities and Scholarly Research Trends in the Asia-Pacific
(pp. 181-199). IGI Global.
4. Montasari, R., Hill, R., Carpenter, V., & Hosseinian-Far, A. (2019). The Standardised Digital
Forensic Investigation Process Model (SDFIPM). In Blockchain and Clinical Trial (pp. 169-209).
Springer, Cham.
5. Xiao, J., Li, S., & Xu, Q. (2019). Video-based Evidence Analysis and Extraction in Digital
Forensic Investigation. IEEE Access.
6. Panchal, E. P., Yagnik, S. B., & Sharma, B. K. (2019). Use of Machine Learning Algorithm on
File Metadata for Digital Forensic Investigation Process. In Third International Congress on
Information and Communication Technology (pp. 401-408). Springer, Singapore.
7. Patel, P. C., & Sharma, B. K. (2019). An Advance Approach of Aggregation and Archival of
Digital Forensic Information on Windows-Based Environment. In Third International Congress on
Information and Communication Technology (pp. 447-456). Springer, Singapore.
8. Moscato, F., Romeo, F., & Xhafa, F. (2019, February). A Hybrid Approach for Document
Analysis in Digital Forensic Domain. In Advances in Internet, Data and Web Technologies: The 7th
International Conference on Emerging Internet, Data and Web Technologies (EIDWT-2019) (Vol.
29, p. 170). Springer.
9. Maiorca, D., & Biggio, B. (2019). Digital Investigation of PDF Files: Unveiling Traces of
Embedded Malware. IEEE Security & Privacy, 17(1), 63-71.
10. Le‐Khac, N. A., Plunkett, J., Kechadi, M. T., & Chen, L. (2019). Digital Forensic Process and
Model in the Cloud. Security, Privacy, and Digital Forensics in the Cloud, 239.
5
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]