Assessing Cyber Security Issues: Cyber Crime Fundamentals Report
VerifiedAdded on 2023/01/04
|6
|1181
|35
Report
AI Summary
This report delves into the fundamentals of cyber crime, focusing on digital forensics and related standards and regulations. It begins by identifying and listing relevant ISO standards for digital forensics, emphasizing their role in guiding the identification, collection, and handling of digital evidence. The report then examines the UK Forensic Science Regulator's Codes of Practice and Conduct, specifically Section 21, and discusses the challenges a digital forensic scientist might face in complying with it. Furthermore, the report outlines a forensic investigation process using provided evidence, detailing the steps of collecting, analyzing, and presenting the findings, complete with screenshots and references to illustrate the process. The analysis covers the ISO/IEC 27037 standard and the application of forensic techniques in a murder investigation scenario, concluding with a summary of the importance of forensic departments in investigating unresolved cases and adhering to security standards.

Cyber crime
fundamentals
fundamentals
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
INTRODUCTION ..........................................................................................................................3
Part A ..............................................................................................................................................3
REFERENCES ...............................................................................................................................6
INTRODUCTION ..........................................................................................................................3
Part A ..............................................................................................................................................3
REFERENCES ...............................................................................................................................6

INTRODUCTION
Part A
Series of ISO standards in digital forensic
This is a standard which provides guidance for identifying, collecting, gathering and
handling digital forensic evidence. The main purpose of !SO27K digital forensic standard is to
provide promotion for good practise methods. These are associated with process of forensic
capturing and investigating of digital evidence. When there are some individual investigators,
organisations as well as jurisdictions are retaining within a certain method (Blakemore, 2016).
This consists of managing standards for individual investigators as well as organisations that can
lead to adoption of same identical approaches at international level. This helps in making it
easier for comparing, combining and contrasting the results of investigations when there is
performance of different people or organisation. There are some critical issues within forensic
investigations within acquisition and preservation of evidence. When there are some
conventional physical evidences, then it is very important to gather and protect by using
structured process. It is involved within acceptance of scenario. There is need of managing
baseline level of information security which helps in meeting goals and objectives. The digital
forensic evidence is stored within electronic storage and communication media. This consists of
several cellphones, iPods, computers and video games. In context of ISO/IEC 27037, there were
no globally accepted standards which are involved in forensic evidence. Police has developed
own national guidelines and procedures for acquisition and protection of electronic evidence. It
involves creation of lot of issues when cross border crimes are committed. It is associated with
evidence required for managing different courts. The main scope of ISO standard is to manage
traditional IT systems. This includes managing crime which is committed in context of one
jurisdiction and this is regarded as crime. There is unique legislative system in different
countries. There is crime committed in context of one jurisdiction. There is need to manage
digital evidence which means that information from digital devices are present within the
company for managing the work. This is interpreted that all jurisdiction specific technology
(Sunde, 2017).
ISO/IEC 27041:2015 – There is fundamental purpose of ISO 27K digital forensic that is
involved in promoting of several ways to manage security. This consists of encapsulating best
Part A
Series of ISO standards in digital forensic
This is a standard which provides guidance for identifying, collecting, gathering and
handling digital forensic evidence. The main purpose of !SO27K digital forensic standard is to
provide promotion for good practise methods. These are associated with process of forensic
capturing and investigating of digital evidence. When there are some individual investigators,
organisations as well as jurisdictions are retaining within a certain method (Blakemore, 2016).
This consists of managing standards for individual investigators as well as organisations that can
lead to adoption of same identical approaches at international level. This helps in making it
easier for comparing, combining and contrasting the results of investigations when there is
performance of different people or organisation. There are some critical issues within forensic
investigations within acquisition and preservation of evidence. When there are some
conventional physical evidences, then it is very important to gather and protect by using
structured process. It is involved within acceptance of scenario. There is need of managing
baseline level of information security which helps in meeting goals and objectives. The digital
forensic evidence is stored within electronic storage and communication media. This consists of
several cellphones, iPods, computers and video games. In context of ISO/IEC 27037, there were
no globally accepted standards which are involved in forensic evidence. Police has developed
own national guidelines and procedures for acquisition and protection of electronic evidence. It
involves creation of lot of issues when cross border crimes are committed. It is associated with
evidence required for managing different courts. The main scope of ISO standard is to manage
traditional IT systems. This includes managing crime which is committed in context of one
jurisdiction and this is regarded as crime. There is unique legislative system in different
countries. There is crime committed in context of one jurisdiction. There is need to manage
digital evidence which means that information from digital devices are present within the
company for managing the work. This is interpreted that all jurisdiction specific technology
(Sunde, 2017).
ISO/IEC 27041:2015 – There is fundamental purpose of ISO 27K digital forensic that is
involved in promoting of several ways to manage security. This consists of encapsulating best
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

practices in context of implement8ing the third for testing and assisting assurance process. There
is proper guidance for capturing and analysing functional as well as non functional requirements.
It provides guidance for mechanism that ensures methods and processes which are used within
investigation and information security incidents. Main aim for the standard is to assure that
forensics processes and tools are used within investigation of digital evidence. According to this
standard, there is principal for managing principle sand context for planning and sustaining in
proper manner.
The ISO/IEC 27043:2015 states that it provides guidelines for encapsulating a common model
for investigating properly. This consists of managing different process used for dissemination
and general advice. There are different guidelines for managing processes as well as principles
used for investigating principles and process.
ESI is one of the potential way by which there is identification of case properly. It consists of
managing locations, custodians and volumes for managing the work. There is need to manage
and develop effective way to ensure and create protection. ESI is ruled by holding legal hold and
starting the forensic process for ensuring and protecting remaining steps. ESI is collected through
original custodian and it is typically removed by original data storage (Upadhyaya and Jain,
2016). This is generally associated with media storages, devices and envelops. In context of
internet, this is seen that fingerprints and DNA evidence is linked with managing original
evidence properly. There are physically removing systems which are providing a clear
implication for integrity, confidentiality and availability of information.
Current UK Forensic Science regulator's code of practice and conduct . Read section 21 and say
why a digital forensic scientist might have difficulty complying this item
Computer forensics is known as an important aspect which has helped in determining
various law enforcements within computer hobbies. There is a major change in the digital
forensic that is needed for analysing standard techniques, procedures and protocols. It is
important to understand the need of controlling and managing efficient working so that
formalism and development is maintained.
A forensic scientist may have difficulty complying with Section 21 of the Forensic Science
Regulator’s Codes of Practice and Conduct because software rarely (if ever) comes with a
certification from the manufacturer as to its validity (or for that matter, fitness for purpose to do
anything).
is proper guidance for capturing and analysing functional as well as non functional requirements.
It provides guidance for mechanism that ensures methods and processes which are used within
investigation and information security incidents. Main aim for the standard is to assure that
forensics processes and tools are used within investigation of digital evidence. According to this
standard, there is principal for managing principle sand context for planning and sustaining in
proper manner.
The ISO/IEC 27043:2015 states that it provides guidelines for encapsulating a common model
for investigating properly. This consists of managing different process used for dissemination
and general advice. There are different guidelines for managing processes as well as principles
used for investigating principles and process.
ESI is one of the potential way by which there is identification of case properly. It consists of
managing locations, custodians and volumes for managing the work. There is need to manage
and develop effective way to ensure and create protection. ESI is ruled by holding legal hold and
starting the forensic process for ensuring and protecting remaining steps. ESI is collected through
original custodian and it is typically removed by original data storage (Upadhyaya and Jain,
2016). This is generally associated with media storages, devices and envelops. In context of
internet, this is seen that fingerprints and DNA evidence is linked with managing original
evidence properly. There are physically removing systems which are providing a clear
implication for integrity, confidentiality and availability of information.
Current UK Forensic Science regulator's code of practice and conduct . Read section 21 and say
why a digital forensic scientist might have difficulty complying this item
Computer forensics is known as an important aspect which has helped in determining
various law enforcements within computer hobbies. There is a major change in the digital
forensic that is needed for analysing standard techniques, procedures and protocols. It is
important to understand the need of controlling and managing efficient working so that
formalism and development is maintained.
A forensic scientist may have difficulty complying with Section 21 of the Forensic Science
Regulator’s Codes of Practice and Conduct because software rarely (if ever) comes with a
certification from the manufacturer as to its validity (or for that matter, fitness for purpose to do
anything).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Investigation process for forensic
In the given scenario/picture, there is case of murder and forensic department has to
investigate in order to manage crime. There are different ways by which this crime can be
solved. Process for determining the murder seen and investigating will be assessed through
following steps -
Collecting - There is collection of sample of fingerprints from different items like wallet,
credit card, furniture, etc. in order to know the number of individuals present at crime
scene.
Analysing - The data is analysed by using the forensic technique for grabbing knowledge
and information about how murder happened (Yar and Steinmetz, 2019).
Presenting - Forensic department has to provide a proper report which will include
details about DNA of the person, fingerprints and edible items within that crime scene.
Conclusion
From the above analysis, it is concluded that forensic department has to focus a lot upon
9invetsigating different unresolved cases. There is need to manage different ways to evaluate
different cases. There are some standards involved within the forensic scene to manage the
security.
In the given scenario/picture, there is case of murder and forensic department has to
investigate in order to manage crime. There are different ways by which this crime can be
solved. Process for determining the murder seen and investigating will be assessed through
following steps -
Collecting - There is collection of sample of fingerprints from different items like wallet,
credit card, furniture, etc. in order to know the number of individuals present at crime
scene.
Analysing - The data is analysed by using the forensic technique for grabbing knowledge
and information about how murder happened (Yar and Steinmetz, 2019).
Presenting - Forensic department has to provide a proper report which will include
details about DNA of the person, fingerprints and edible items within that crime scene.
Conclusion
From the above analysis, it is concluded that forensic department has to focus a lot upon
9invetsigating different unresolved cases. There is need to manage different ways to evaluate
different cases. There are some standards involved within the forensic scene to manage the
security.

REFERENCES
Books and Journals
Blakemore, B., 2016. Policing cyber hate, cyber threats and cyber terrorism. Routledge.
Holt, T.J., 2018. Regulating cybercrime through law enforcement and industry mechanisms. The
ANNALS of the American Academy of Political and Social Science. 679(1). pp.140-157.
Sunde, I.M., 2017. Cybercrime law. Digital Forensics, pp.51-116.
Upadhyaya, R. and Jain, A., 2016, April. Cyber ethics and cyber crime: A deep dwelved study
into legality, ransomware, underground web and bitcoin wallet. In 2016 International
Conference on Computing, Communication and Automation (ICCCA) (pp. 143-148).
IEEE.
Yar, M. and Steinmetz, K.F., 2019. Cybercrime and society. SAGE Publications Limited.
Books and Journals
Blakemore, B., 2016. Policing cyber hate, cyber threats and cyber terrorism. Routledge.
Holt, T.J., 2018. Regulating cybercrime through law enforcement and industry mechanisms. The
ANNALS of the American Academy of Political and Social Science. 679(1). pp.140-157.
Sunde, I.M., 2017. Cybercrime law. Digital Forensics, pp.51-116.
Upadhyaya, R. and Jain, A., 2016, April. Cyber ethics and cyber crime: A deep dwelved study
into legality, ransomware, underground web and bitcoin wallet. In 2016 International
Conference on Computing, Communication and Automation (ICCCA) (pp. 143-148).
IEEE.
Yar, M. and Steinmetz, K.F., 2019. Cybercrime and society. SAGE Publications Limited.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.