Report on Fraud Examination and Investigation Techniques in Cybercrime

Verified

Added on  2023/06/04

|4
|722
|445
Report
AI Summary
This report delves into the critical realm of fraud examination and investigation techniques, specifically focusing on the challenges posed by cybercrime. It underscores the significance of cybersecurity and relevant legislation in the face of evolving digital threats. The report outlines essential steps for cybercrime investigations, including the use of illustrative language, email and internet provider address information, and the establishment of robust security measures. It emphasizes the importance of digital data security, witness testimony, and the role of investigative reports in controlling access. Furthermore, it highlights the need for collaboration between security agencies and other government bodies, along with the implementation of data recovery mechanisms and expert teams. The report concludes by stressing the importance of quick response mechanisms to restore and recover data losses in consultant organizations, offering valuable insights into combating cybercrime.
Document Page
Running Head:FRAUD EXAMINATION AND INVESTIGATION TECHNIGUES
1
Fraud Examination, Investigation techniques
Name
Institution
Professor
Course
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
FRAUD EXAMINATION AND INVESTIGATION TECHNIGUES
2
Fraud Examination and Investigation techniques
Cybercrime issues are hard to be separated from the environment. The modern fraudsters
are protected by the anonymity victims’ embarrassment through the internet. Cyber security and
legislation related to the fraudster plays an important role in modern information technology
development and internet services. United Nations General assembly in 2010 came up with the
solution for the cybercrime and fraudster by introducing cybercrime legislation. Developing
computer cybercrime regulations acts is a fundamental step for all nations. Criminal acts cover
any act that falls within the cyber terrorism (Wells, 2018, p. 59). The cybercrime offenses fall
into three legal principles such as confidentiality, availability, and integrity (Sommer, 2014, p.8).
Most of the communications on the internet and through networks relies on the internet
provider address to reach the intended destination (Casey, 2011, p. 5). In order for the fraudster
examiners to undertake an investigation on the cybercrime that happened in an organization, the
officer should make use of the following laid down steps:
The use of illustration language should be enacted while enlisting legal process.
Make use of the e-mail address information.
The address information with regard to internet provider should be used.
The process of protecting the cybercrime operating systems, any internal computer
misfortunes is ignored. Intelligence services team protects computers against challenges such as
the viruses, spyware, worms and the programs which are not wanted in the computer system.
Investigation team makes sure that any individual who needs access beyond the normal role in an
Document Page
FRAUD EXAMINATION AND INVESTIGATION TECHNIGUES
3
organization has a need for creation of multiple roles. However, an administrator must limit role
editing and the roles themselves. The reason behind this is to make it efficient with this kind of
approach.
Logic secure to the digital data as well as physical evidence is required to allow the non-
repudiation of evidence on the device used. Digital data security is configured through running
the software at the same time as the cybercrime. The digital signature provides the authenticity as
well as the integrity of the evidence recorded. The relationship between the digital and physical
documentary security is that the attestation of the operation in collecting and securing evidence
law and jurisdiction should be applied. The role of witness testimony is to give the evidence on
what aspired to the cybercrime. In this case, the nature of witness requires an access that is
limited and regulating authentication of individuals (Gercke, 2012, p. 78).
The Investigative report gives an access control via mechanism varieties. These
mechanisms provide authentication and validate the identity of the people. With systems of the
computer, there is access to varieties of control in the methodology that can be used to ensure the
access of execution of files. The security agencies in collaboration with other government
organs should be prepared for cyber crimes. Considering the consultant organization,
implementation of data recovery mechanisms and a team of experts is one of the cyber
governance frameworks. In this case, the security organs should quick response mechanisms to
help restore and recover data loses whenever such crimes happen in a consultant organization.
Document Page
FRAUD EXAMINATION AND INVESTIGATION TECHNIGUES
4
References
Casey, E., 2011. Digital evidence and computer crime: Forensic science, computers, and the
internet. Academic press. 5 (2), pp. 3-6.
Gercke, M., 2012. Understanding Cybercrimes: Phenomena, Challenges and Legal Response.
International Telecommunication Union. 39 (5), pp. 78.
Sommer, P., 2014.The future for the policing of cybercrime. Computer Fraud &
Security, 2004(1), pp.8-12.
Wells, J.T., 2018. Principles of fraud examination. Hoboken, NJ: Wiley. 45 (3), pp. 56-78.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]