COIT20267 Computer Forensics: Methodology and Security Policies

Verified

Added on  2023/06/11

|18
|4740
|423
Case Study
AI Summary
This computer forensics case study delves into the methodologies and resources required for digital investigations, emphasizing data and evidence identification, acquisition, and analysis. It outlines a structured approach to handling digital crime scenes, including the importance of relevant security policies and recommendations for companies to mitigate risks such as unlawful expense shirking and fraud. The study also highlights the necessity of adhering to legal requirements, securing evidence properly, and utilizing trusted tools for analysis, further mentioning the role of business intelligence in assessing potential risks and ensuring compliance with anti-corruption measures. The document concludes by underscoring the importance of proactive fraud detection and prevention strategies within financial institutions.
Document Page
Running head: COMPUTER FORENSICS
Computer Forensics
Name of the Student:
Name of the University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1COMPUTER FORENSICS
Executive Summary
Computer forensics is considered as a branch of digital forensics science and handles crime
evidence legally. It has been found that computer hard drives as well as digital storage files along
with software. In addition, the procedure of computer forensic deals with data recovery and
regulations. Corporate computerized legal examination is included the underlying three periods
of open examination pertinent to examination inside organization. This type of examination is
directed by corporate advanced crime scene investigation, manager of computer systems helped
by specialists on physical exchange and information assurance in the company. Progressed
lawful sciences systems are as needs be not simply required to get automated demonstrate in
circumstances where the bad behavior is completed using a propelled device yet moreover where
best in class verification is required for cases at first not so much a modernized bad behavior.
Document Page
2COMPUTER FORENSICS
Table of Contents
Introduction..........................................................................................................................3
The use of the digital forensic methodology.......................................................................3
The resources required to conduct a digital forensic investigation.....................................5
Data/evidence identification and acquisition.......................................................................8
Outline approach and steps to be taken.............................................................................11
Relevant security policies..................................................................................................13
Recommendations to the Company...................................................................................14
Conclusion.........................................................................................................................15
References..........................................................................................................................16
Document Page
3COMPUTER FORENSICS
Introduction
Computerized scientific examination includes police investigative bodies and exceptional
arraignment for digital wrongdoing that lead examination based on Law on criminal method,
Law on fighting digital wrongdoing, Law on electronic correspondence, Law on assurance of
data and data frameworks, Law on advanced confirmation, Law on electronic mark and Law on
electronic trade. General procedure of authority computerized legal examination, based on "well
ordered" model involves 4 stages. In evident instances of digital wrongdoing, at the phase of
preparatory examination and hunt, investigative bodies gather proof of sensible uncertainty and
put in a claim against the presume who can likewise be obscure person. Based on police
discoveries, the prosecutor gives a warrant to examination from investigative judge and starts
official examination. In light of a legitimate court arrange, suspicious computer or
correspondence framework can be brief reallocated; that is, physical picture of the hard plate or
memory substance of IT framework and gadgets with the end goal of measurable obtaining and
information examination can be taken.
The use of the digital forensic methodology
Nelson, Phillips and Steuart (2014) stated that as advanced forensic end up being more
unpreventable in today’s society, governments and private substances consider the need to
realize control structures. Order, methodologies and tenets are rapidly being made by parliaments
and sheets with a ultimate objective to keep these bad behaviors from spiraling wild. Progressed
lawful sciences and, to some extent, e-disclosure have transformed into a key bit of the execution
segments used as a piece of taking care of these cybercrimes. The quick headway of mechanized
contraptions has essentially influenced the progressed lawful sciences gather with cutting edge
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4COMPUTER FORENSICS
bad behaviors growing likewise as fast. Court methodology worldwide are by and by
encountering different circumstances where despite their fixation and starting, there is some sort
of automated affirm included. Ordinary cases including drug trafficking, killings, blackmail and
a stack of others as of now depend seriously on a few information/data living on a propelled
device (Halboob et al. 2016). Propelled wrongdoing scene examination show challenges, as the
affirmation picked up is normally special in connection to various types of confirmation acquired
in other "criminological" examinations. The essential differentiations fuse the way that
mechanized affirmation can without a lot of an extend be imitated and controlled by work drive
required with the examination (Lewis 2017), maliciously or unexpectedly. This paper will
recognize some essential issues as for the use of the electronic quantifiable strategy to pick up
the propelled affirmation to be used to convict or vindicate individuals reprimanded for such bad
behaviors. It will present a multidimensional approach joining the true blue, particular, moral and
educational estimations of modernized criminology to shape a consolidated framework and logic
for examinations including propelled affirmation. The objective of these plans is to convey a
response for issues enveloping mechanized demonstrate securing and resulting presentation in
court and outlines rules for making this kind of affirmation more generous when shown in court.
The resources required to conduct a digital forensic investigation
Negative consideration, mischief to corporate reputation and loss of liberality, legitimate
and regulatory endorsements and hostile effect on the principle issue – are generally possible
aftereffects of an affiliation's failure to manage the risk of unlawful expense shirking. Various
establishments go up against the trial of watching out for the peril of unlawful expense evasion
on various fronts (Montasari et al. 2015). The test is significantly more important for complex
associations that work in a couple of lines of business and geologies, and associations that have
Document Page
5COMPUTER FORENSICS
broadened errands through a merger or getting as they face distinctive true blue and authoritative
necessities, vernaculars, IT systems and business social orders. With controllers grasping stricter
headings on cash related trades and enhancing their necessity attempts, associations are defying
extended versatile quality on customer unmistakable evidence and checking programs. Using our
settled strategy and going along with it with our bent and perception of the regulatory condition,
we give an entire extent of Anti-Money Laundering organizations: Review/develop an against
tax avoidance (AML) structure, due eagerness and cautioning to consistence advancement
cautioning and systems compromise.
A fundamental edge to stimulate duty and straightforwardness inside an affiliation is a
framework to enable all individuals to voice worries inside in a skilled and effective way when
they discover information, which they trust, exhibits honest to goodness carelessness.
Completing a laborer whistle blowing hotline gives your delegates a voice to secretly report
workplace concerns and engages you to recognize and revise issues before they hurt your
business and its reputation. Building Finance Pty Ltd Tip-offs Anonymous can go about as a
snag for deceitful direct that could incite mishaps. It is also ended up being among the best ways
to deal with recognizes distortion according to the Association of Certified Fraud Examiners
(ACFE). Additionally, the proximity of a whistle blowing helpline can bolster staff certainty by
engaging regards, for instance, place stock in, respectability, openness, dependability and
straightforwardness (Cho 2015). Building Finance Pty Ltd's Tip-offs Anonymous is a free and
private whistle blowing office that allows visitors to bring a stress up with respect to a scene of
terrible conduct, blackmail or misleading behavior inside the workplace, while taking care of
anonymity.
Document Page
6COMPUTER FORENSICS
With banks standing up to expanded authoritative and open examination in various
countries, using advanced examination to help recognize potential awful conduct sooner may be
an imperative and operational goal. Advancement has made new streets for banks to balance or
recognize deception a similar number of the markers of coercion are concealed inside the bank's
operational data. An adroit data examination gadget can mine through this data and recognize
covered associations and alerts. This will enable banks to proactively perceive potential tricky
trades beforehand they show themselves months or years down the line. Examination can
empower banks to refine the way they play out the sort of watching that will empower them to
recognize and perceive potential blackmail before the dispatch of a formal examination by
controllers (Leelasankar et al. 2018). Banks should utilize the results of danger evaluations to
center around their examination tries and alter their checking structures for reliable change. They
should then reshape their coercion distinguishing proof undertakings using advanced
examination and related instruments, programming and applications to get oversight that is more
powerful. These methods can help update distortion counteractive action, and additionally
indicate controllers a wander wide feeling of obligation with respect to approving an effective
against blackmail strategy. Our proposals to specific keeping cash clients will depend on the
perils they stand up to and the state of their steady watching strategy and development.
The present business condition produces tremendous measures of data and information.
Nevertheless, a few billions of dollars are lost every year in view of deception, budgetary screw
up or other trouble making, for instance, information deletion, plan encroachment or unapproved
get to, et cetera. Business examinations and cases logically rely upon this data to help describe
the whole story. The best approach to directing such tremendous volumes is changing the
assortment of data into imperative information.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7COMPUTER FORENSICS
• Understand material legitimate necessities and methodologies • Secure and accumulate
demonstrate in a path unsurprising with principles of reasonableness • Analyze the affirmation
with trusted and endorsed contraptions
• Present the confirmation legitimately We have the best in class logical and quantifiable
advancement labs masterminded in working environments that component an assortment of
development and gadgets to help lawful imaging, examination, electronic exposure and
electronic data irregularity distinguishing proof (Kizza 2017). It can assemble, defend and
procure data from computer systems including hard drives, advantageous media, servers,
propelled cell phones and go down media. Our computer logical organizations include: •
Forensic imaging and examination • Forensic examination organizations
• Computer legitimate scene response
• Training in computer quantifiable
• Legal business advising
Data/evidence identification and acquisition
Hypothesis banks either endeavoring to raise capital for their clients, through open or
private commitments, or provoking clients on potential trades, or a private esteem theorist
placing assets into an association generally require an objective picture and perception of the
establishments of the social events included. Such information can help with easing reputational,
genuine, or business perils concerning thought about trades. So also as strict unfriendly to tax
avoidance controls have made it essential for fiscal associations to sharpen "know your
customer" due resourcefulness, the need to "know your dealer" accept a tantamount part in
Document Page
8COMPUTER FORENSICS
directing coercion and managerial peril for associations. We give objective and exact
information on individuals and substances for clients that search for exhaustive learning with
respect to due energy, case support, and coercion and business examinations. Our Business
Intelligence (BI) bunch has experienced explore specialists who have dominance to gather
material information from open records, purchased in databases, press and media sources (Liu
2016). Work zone look at is supplemented by a carried out field examination bunch that has a
strong framework all through the country to endeavor establishment examinations of subjects,
recognizing beyond reconciliation condition, undisclosed associations and affiliations or
deciding issues, for instance, any prior budgetary, true blue, authoritative or criminal issues or
associations with dealt with bad behavior.
The upward example in regulatory against corruption exercises all around has suggested
that Indian money related foundations need to ensure their consistence programs are solid and
attempted. This will restrict chances of prosecution and basic fines under Indian laws, and
additionally under the more stringent overall bearings like U.S. Remote Corrupt Practices Act
(FCPA) and the UK Bribery Act (UKBA). Looked with these managerial and definitive needs,
cash related establishments should now set themselves up against pollution risks and consider
fitting peril organization systems, methodologies and strategies to ease the threat of fixes being
paid, clearly or roundabout. Our unfriendly to pollution specialists have helped a bit of the
world's driving associations and associations investigate the risks rising up out of against
degradation institution
Additionally controlling of benefits and external shipper induced fakes are overwhelming
in the corporate dealing with a record area. Likewise, the introduction of advancement for web
and adaptable dealing with a record are inciting fresher sorts of fakes like phishing, account
Document Page
9COMPUTER FORENSICS
takeover, hacking and cloning. Any response to deception in this way, should be fast and
convincing (Ravi et al. 2016). The RBI round dated September 2009 anticipated that banks
would investigate 'immense regard fakes' with the help of gifted work for inside remedial
movement against the staff and external genuine arraignment of the fraudsters and their abettors.
On account of investigating a colossal scale cash related clarification distortion, laborer
indecency, securing blackmail, contamination or general accounting abnormalities, our
budgetary coercion investigative gathering has wide inclusion in dealing with the inflexibly
prevalent and complex salaried bad behavior in the money related organizations industry.
Examination Conducted an examination to perceive the quantum of incident to a couple
of cash related foundations on account of distraction of admission credit conveyances by a
borrower. Our examination of the trades helped in the ID of various round trades, misleading and
sporadic trades inciting the redirection of advantages. We moreover perceived a couple of
abnormalities in approving and seeing of workplaces and assessed the hardship to the cash
related associations. Against pay off and degradation Appointed by a fundamental association in
India to review their exercises for consistence with the Foreign Corrupt Practices Act (FCPA).
As a noteworthy part of the assignment, we recognized a couple of high risk/sporadic trades
including government specialists and contract workers. The overview revelations also revealed
tricky charging by an impermanent laborer for nebulous vision experts. Blackmail chance
organization Appointed by a primary multinational bank for driving an all around review of the
bank's wealth organization front end process. We recognized process weakness which could
provoke mis-offering, distortion and managerial encroachment and prescribed changes to the
technique to enhance the control condition.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10COMPUTER FORENSICS
Following a fundamental review, we displayed a positive report of our disclosures.
Following up on our recommendations, the client attracted us to help them in strengthening their
caution clearing techniques; including setting up their specialists and working up a self-ruling
Quality Assurance (QA) work (Harichandran et al. 2016). Business learning Appointed by a
social affair of credit authority banks to finish cash related declaration examination, asset
following and recognizing the improvement of benefits for perceived borrower associations. We
coordinated field examination, source enquiries and work region dares to find nearness, nature of
business and associations of the borrowers with picked substances and recognized undeterred
assets. The results from the field examinations moreover exhibited that the borrowers had
involved the advantages for place assets into arrive wanders. We secured quantifiable pictures of
computers of different suspects and drove modernized logical recovery strategies. This supported
in recognizing chronicles and pictures related to the execution of false development and
unapproved trades. The gathering assisted with uncovering sensible verification that helped fill
the missing associations, unavoidably allowing the law usage association to record the charge
sheet inside the stipulated time and moreover drew out a couple of shortcomings in server outline
settings that could help future fraudsters.
Outline approach and steps to be taken
Nowadays, computer advancement is used at an astoundingly high degree in each piece
of our lives. This is generally in light of the way that it has made our lives less complex in a
couple of ways. Particularly, it has given current society an imperative asset, which is the
accelerating of techniques through significantly extended benefit and efficiency. Moreover,
access to any kind of information is staggeringly advanced. Regardless, could this enhanced
access to information go about as an increased edged sword in the usage of computer
Document Page
11COMPUTER FORENSICS
advancement? Shockingly, computer advancement can in like manner be used as a piece of
demand to perform exploitative and some of the time even unlawful activities as well. These
activities constitute information security scenes. Information security is portrayed as protecting
information and information systems from unapproved get the opportunity to, use, exposure,
aggravation, adjustment, or pulverization (Tang 2016). The already specified exploitative
activities are attacks that expect to harm information security gathering of three (CIA), which is
Confidentiality, Integrity and Availability of computer data and systems. It is a dreary fact of
current society that the amount of information security strikes is extending essentially reliably. In
this way, there is an uncommon prerequisite for information security experts that can oblige
these ambushes. Information security authorities' sensible field is called Computer Forensics.
Specifically, computer criminology is described as the show that merges segments of law and
programming designing to accumulate and separate data from computer structures, frameworks,
remote correspondences, and limit contraptions in a way that is adequate as affirmation in a court
(US-CERT, 2008). Inside this proposition computer lawful sciences with respect to cash related
infringement is asked about. Specifically, the occasion of Enron shock is the cash related bad
behavior that it is examined here. The Enron shock (October 2001) has been depicted as the
greatest dissatisfaction ever of free undertaking and its fold influenced monetary masters to lose
a ton of money and laborers to lose their livelihoods, their restorative assurances and their
retirement finances as well. Government examination about the shock, which continued going
pretty much five years, contemplated that Enron's authorities misrepresented its expecting profits
by a couple of associations and moreover control of its cash related clarifications was.
Other than the cash related bad behavior degree of the humiliation, it can be considered
as a computer helped bad behavior likewise, on account of the colossal measure of inculpatory
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]