OMA054-6: Investigating Electronic Emails in UK - Digital Forensics
VerifiedAdded on 2023/03/24
|14
|1236
|43
Report
AI Summary
This report investigates the methods, procedures, and tools used by digital forensics companies in the UK to investigate crimes committed through electronic emails. It identifies the types of crimes prevalent in electronic communications, details the procedures followed by forensic companie...

Forensics and Incident
Response (Electronic emails)
Response (Electronic emails)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Aim and Objectives
Aim:
To investigate over recent method, procedures and tools used for Electronic emails by
digital forensics company in UK.
Objectives:
• To identify the crime that take place through electronic emails.
• To determine the procedures that are followed by digital forensic companies for
investigating on crimes caused through electronic emails.
• To understand the methods and tools that are used for Electronic emails by digital
forensics company in UK.
• To recommend way to reduce the rate of crime that take place through Electronic emails
at UK.
Aim:
To investigate over recent method, procedures and tools used for Electronic emails by
digital forensics company in UK.
Objectives:
• To identify the crime that take place through electronic emails.
• To determine the procedures that are followed by digital forensic companies for
investigating on crimes caused through electronic emails.
• To understand the methods and tools that are used for Electronic emails by digital
forensics company in UK.
• To recommend way to reduce the rate of crime that take place through Electronic emails
at UK.

Methodologies
This is an important part of the research as it helps to conduct the
research in effective manner. Below given are the methodologies that
are followed by the researcher:
• Research philosophy: This can be determined to be the values, belief
and assumptions that are carried out the researcher for the topic. The
research has made use of positivism as it enables to focus on the real
facts and figures that are important for the research.
• Research strategy: It is important for the research to determine
appropriate way so that the research can be carried out in effective
manner. Among these two research strategies, qualitative research is
selected as it will be help to focus on the develop in depth
understanding
This is an important part of the research as it helps to conduct the
research in effective manner. Below given are the methodologies that
are followed by the researcher:
• Research philosophy: This can be determined to be the values, belief
and assumptions that are carried out the researcher for the topic. The
research has made use of positivism as it enables to focus on the real
facts and figures that are important for the research.
• Research strategy: It is important for the research to determine
appropriate way so that the research can be carried out in effective
manner. Among these two research strategies, qualitative research is
selected as it will be help to focus on the develop in depth
understanding

Cont…
• Research approach: This is an important aspect in research as it focus on the type
of pattern that are applied by the business to gather information. Among these
two the researcher has made use of inductive approach in which the information
is provided generally and then specific information is presented.
• Research design: This is determined to be the blue print in which step by step
process is presented. Among all these, the researcher has made use of descriptive
design is applied as it enables to focus on the aim and objectives that are set.
• Data Collection: This is the ways through which information is gathered in
accordance with the research topic. Among these two, the researcher has made
use of both these methods that is primary and secondary. Primary through
interview and secondary through books, journals, online links, etc.
• Research approach: This is an important aspect in research as it focus on the type
of pattern that are applied by the business to gather information. Among these
two the researcher has made use of inductive approach in which the information
is provided generally and then specific information is presented.
• Research design: This is determined to be the blue print in which step by step
process is presented. Among all these, the researcher has made use of descriptive
design is applied as it enables to focus on the aim and objectives that are set.
• Data Collection: This is the ways through which information is gathered in
accordance with the research topic. Among these two, the researcher has made
use of both these methods that is primary and secondary. Primary through
interview and secondary through books, journals, online links, etc.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Cont…
• Sampling: It is not possible for the researcher to focus on the population that can
provide adequate data as per the research topic. Among these two, the researcher has
made use of probabilistic sampling method. Further, it can be stated that the
researcher has conducted interview from 5 of the Forensic exports as they have proper
understanding for the research topic.
• Data analysis: When information is gathered, then it required to have proper analysis
made. Among these two, the researcher has made use of qualitative method in which
the information gathered is presented in the form of thematic.
• Ethical consideration: There are different type of ethical considerations that has to be
considered by the researcher. These data cannot be used as it is but, it requires to be
writer in own words. Further, there is a proper system that is used so that the personal
information that are provided by the respondents are not being mis used.
• Sampling: It is not possible for the researcher to focus on the population that can
provide adequate data as per the research topic. Among these two, the researcher has
made use of probabilistic sampling method. Further, it can be stated that the
researcher has conducted interview from 5 of the Forensic exports as they have proper
understanding for the research topic.
• Data analysis: When information is gathered, then it required to have proper analysis
made. Among these two, the researcher has made use of qualitative method in which
the information gathered is presented in the form of thematic.
• Ethical consideration: There are different type of ethical considerations that has to be
considered by the researcher. These data cannot be used as it is but, it requires to be
writer in own words. Further, there is a proper system that is used so that the personal
information that are provided by the respondents are not being mis used.

Cont…
• Research limitations: There are different type of
limitations that has to be considered by the researcher.
• Limitation of aim and objectives
• Limitation of finance
• Limitation of time
• Limitation of connecting the respondents
• Research limitations: There are different type of
limitations that has to be considered by the researcher.
• Limitation of aim and objectives
• Limitation of finance
• Limitation of time
• Limitation of connecting the respondents

Result and discussion
Theme 1: Rate of crime is increasing with electric emails
• From the interview conducted from 5 of the respondents, it is
found that with time there are many changes that has taken place
• There are many new cases of fraud that has been identified in UK.
• From the response given by a forensic export, one of the strategy
applied by people are by making use of top companies in which
luck draws are conducted and viewer is asked to deposit certain
amount of money so as to get the winning price.
Theme 1: Rate of crime is increasing with electric emails
• From the interview conducted from 5 of the respondents, it is
found that with time there are many changes that has taken place
• There are many new cases of fraud that has been identified in UK.
• From the response given by a forensic export, one of the strategy
applied by people are by making use of top companies in which
luck draws are conducted and viewer is asked to deposit certain
amount of money so as to get the winning price.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Cont…
Theme 2: The tools that are important to be considered for
electronic emails
• From the response given by the export, it can be stated that there
are different type of tools that are used by digital forensic
companies so that they are able to conduct the investigation.
• Another export stated that email header analysis done so that the
information can be extracted from the sender’s mail.
• When the information provided do not have any type of given access
to the server, then it enables to opt the network sources.
Theme 2: The tools that are important to be considered for
electronic emails
• From the response given by the export, it can be stated that there
are different type of tools that are used by digital forensic
companies so that they are able to conduct the investigation.
• Another export stated that email header analysis done so that the
information can be extracted from the sender’s mail.
• When the information provided do not have any type of given access
to the server, then it enables to opt the network sources.

Cont…
Theme 3: Improvement in technology is a need for forensic
companies
• There are many changes that has taken place in which hackers are able
to get personal information from people
• Forensic firms has to make use of highly advanced technology so that
they are able to track out criminals and to protect innocent people from
getting in to situations of fraud
• From the response from one of the experts, the forensic team has to be
much more advanced than the technology that are used by criminals
Theme 3: Improvement in technology is a need for forensic
companies
• There are many changes that has taken place in which hackers are able
to get personal information from people
• Forensic firms has to make use of highly advanced technology so that
they are able to track out criminals and to protect innocent people from
getting in to situations of fraud
• From the response from one of the experts, the forensic team has to be
much more advanced than the technology that are used by criminals

Cont…
Theme 4: Most effective method that are helpful to
investigate electronic emails
• The companies make use of different type of methods that are
helpful enough to find the criminals who make use of emails
• From the interview conducted, it was found that IP address is
traced so that the position of the sender can be identified
• Overall it can be stated that the experts have diverse set of
perception for the methods that are applied
Theme 4: Most effective method that are helpful to
investigate electronic emails
• The companies make use of different type of methods that are
helpful enough to find the criminals who make use of emails
• From the interview conducted, it was found that IP address is
traced so that the position of the sender can be identified
• Overall it can be stated that the experts have diverse set of
perception for the methods that are applied
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Cont…
Theme 5: The appropriate procedure that is followed by
forensic companies for investigating electronic emails
• From the response gathered from the interview, it is found
that there are different type of procedure that are followed
• First of all, it is important that proper analysis is made of the
situation so that the condition can be identified
• Moreover, data is gathered in which the interaction or the
relation with the sender is determined
Theme 5: The appropriate procedure that is followed by
forensic companies for investigating electronic emails
• From the response gathered from the interview, it is found
that there are different type of procedure that are followed
• First of all, it is important that proper analysis is made of the
situation so that the condition can be identified
• Moreover, data is gathered in which the interaction or the
relation with the sender is determined

Cont…
Theme 6: The procedure, method and tools applied
effective enough to identify the criminals
• The methods, procedure and the tools that are applied are
effective enough to make sure that proper analysis is
made so that the rate of performance can be made
• This is because of the advanced technology that are used
by the people. There are system in which the IP address
gets changed on every search that are made
Theme 6: The procedure, method and tools applied
effective enough to identify the criminals
• The methods, procedure and the tools that are applied are
effective enough to make sure that proper analysis is
made so that the rate of performance can be made
• This is because of the advanced technology that are used
by the people. There are system in which the IP address
gets changed on every search that are made

Cont…
Theme 7: The main causes due to which people face fraud
type situation
• From the interview conducted, it is identified that there are many
reasons due to which people face situations related with fraud.
• Another type of response given by an expert state that people are
get in stuck of such situation due to emotional conditions.
• These are the condition due to which innocent people get in
problems there are harm faced by them.
Theme 7: The main causes due to which people face fraud
type situation
• From the interview conducted, it is identified that there are many
reasons due to which people face situations related with fraud.
• Another type of response given by an expert state that people are
get in stuck of such situation due to emotional conditions.
• These are the condition due to which innocent people get in
problems there are harm faced by them.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Thank You
1 out of 14
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.