Wednesday, October 30, 2019
Digital forensic incident response Research Paper
Digital forensic incident response - Research Paper Example Digital forensic investigation is important for productive prosecution of the criminals who engage in digital crimes. It is also useful in recovery of misappropriated resources such as finances, important information and others. The investigators should therefore make sure that they obtain quality forensic evidence which the courts of law require in administering justice. As put forth by Selamat et.al (2008), digital forensic investigation is distinct from digital investigation in that the techniques and procedures that the investigator will use allow the output to be applied in a court of law. In this regard, the researcher ought to consider significant steps to carry out a successful forensic investigation. Our evidence is well hidden in images, codes, encrypted files, missing folders and files among others that need to be cracked so as to reveal the misappropriation. The investigator will collect information on: system sabotage; information related on attacks; hijacks on email; sensitive information; selective information on organized and unorganized crimes; cracking and hacking and other important information (International Journal of Advance Research, 2013). The fact that American Marketing Systems hav e suspected that there is something odd happening in the company provides the platform for investigation to verify the basis of these allegations, establish the culprits and reveal the procedures they are using to skim. In this paper, the investigator presents an extensive report of the existence of the skimming, the culprits and the procedure they use. The investigator will perform information analysis, network intrusion, examine malicious file. He will also use tools which have the ability to crack encrypted files and passwords. Most of forensic audit failure is as a result of lack of proper prior planning. Bearing this in mind, the investigator will spend quality time in planning on the devices which
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.