UC Computer Crimes and Digital Forensic Investigation Plan Cybercrimes Research Paper

User Generated

wqq07

Writing

University of the Cumberlands

Description

Please Select An topic on Computer Forensic of cyber crime and follow the below given steps on the paper.

Needed 10-12 pages including abstract, Title page , Cited-references. And PPT also for this assignment.



Overview

This short, graduate-level, scholarly research and writing assignment has as its primary goal the opportunity for each student to evince that they have attained the course’s Learner Outcomes, which represent a subset of the Program Learning Outcomes that apply to anyone who’s earned their M.S. Digital Forensics degree from the University of the Cumberlands.

The applicable PLOs in MSDF 633 are:

Intelligently discuss the nexus of technology and cybercrimes.

 Attain a comprehensive understanding of the vast field of cybercrime and its varied categories.

 Employ digital forensics concepts toward legally solving criminal endeavors perpetrated online.

Learn law enforcement’s responses to cybercrimes, as well as the policies and legislation meant to confine the actions of deviants and criminals operating online.

Assignment

This is a research and writing assignment. You must conduct scholarly research. That means, generally, that in order to learn the information necessary to answer the call of the assignment you should focus on peer-reviewed, scholarly articles. Resources such as Wikipedia, industry white papers, blogs, magazine articles, etc., may help you understand the topics you’re researching, but their value does not rise to the level of such work. The UC library, particularly at the Research Guide for CIS and Nexis Uni (focused on law), and Google Scholar are two ready resources, the former of which you pay for with your UC tuition.

Scholarly research also means that your submitted work must conform to APA style guidelines. Purdue University’s OWL, referenced numerous times in the program, is a great resource for APA lessons.

The assignment should result in an APA paper with a minimum of four pages given to its Main Body, and no more than eight. The page requirement does not relate to Title Page, Abstract, and References pages. The paper should address the following:

1. From the course Section II: Field of Cybercrimes, select one area of cybercrime that frames your work.

2. Discuss it by describing any comparative traditional crime—e.g., trespass as compared to DDoS.

3. Next, create a digital forensics investigation plan that may be applied to solve your selected cybercrime. Ensure that it is detailed enough to prove your knowledge of the discipline as a tool to help solve a crime, while being general enough that, perhaps, it could serve as a template for a law enforcement division.

4. Lastly, discuss a legal case, criminal law (state or federal), and/or an article from a legal journal that relates to your chosen area of cybercrime.

A successful paper will include excellent writing that covers each of those four areas, and also proves that the author attained the four PLOs listed above.

Please needed unique paper with zero plagiarism. with APA style thanks

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hey, find attached the answer

digta
by 12 12

Submission date: 03-Oct-2020 01:04PM (UTC-0400)
Submission ID: 1404197266
File name: digital_forensics.docx (33.91K)
Word count: 2828
Character count: 14956

digta
ORIGINALITY REPORT

13

%

SIMILARITY INDEX

0%

0%

13%

INTERNET SOURCES

PUBLICATIONS

STUDENT PAPERS

PRIMARY SOURCES

1

Submitted to University of Maryland, University
College

12%

Student Paper

2

Submitted to Laureate Higher Education Group
Student Paper

Exclude quotes

On

Exclude bibliography

On

Exclude matches

Off

1%


Running Head: DIGITAL FORENSIC INVESTIGATION
1

Digital Forensics Investigation
Student’s Name
Course Title
Date

“DIGITAL FORENSIC INVESTIGATION”

2

“Network Intrusion, Malware Installation and Insider File Deletion”
Abstract
Digital forensic is a science practice where the inspection, identification, assembly, and
examination of data while conserving the reliability of data and maintaining a severe chain of
care for the data. It can likewise be characterized as the part of information recovery that
administrators have deleted or hidden to ensure that the recuperated information is genuine to
be applied as evidence (Chung et al., 2017). During an examination, the part of a specialist in
digital forensic is to gather information and advanced proof from an accused’s gadget to close
whether there is a proof that a crime was executed or organization strategy or business
guidelines were not complied. Digital information is so delicate that it tends to be easily altered,
reestablished, reproduced or nullified.

“DIGITAL FORENSIC INVESTIGATION”

3

Introduction
Digital forensic is a science practice where the inspection, identification, assembly, and
examination of data while conserving the reliability of data and maintaining a severe chain of
care for the data. It can likewise be characterized as the part of information recovery that
administrators have deleted or hidden to ensure that the recuperated information is genuine to
be applied as evidence (Chung et al., 2017). During an examination, the part of a specialist in
digital forensic is to gather information and advanced proof from an accused’s gadget to close
whether there is a proof that a crime was executed or organization strategy or business
guidelines were not complied. Digital information is so delicate that it tends to be easily altered,
reestablished, reproduced or nullified.
Through the progression of an examination, the investigator must guarantee that
computerized confirmation isn't polluted by being changed without the suitable authorization.
Digital proof is the data that counters or backs a hypothesis that was made during the first
assessment and it very well may be situated in the PC's hard drive, a PDA or telephone, a cell

“DIGITAL FORENSIC INVESTIGATION”

4

phone, a flash card in a camera or on a CD. This research paper will cover assessments of
various sources of information that can be used in investigations of digital forensics, files of
data, equipment of networking, electronic gadgets, PC frameworks and storage media. Each
source will be ranked comparing to their prospective worth with worries to network intrusion,
insider file deletion and installation of malware.
Network intrusion
Network intrusion is the utilization of network that adjusts its permanency or data
protection that can be held on PCs that are connected to it. It is any activity that isn't endorsed
on a PC network (Kabir et al., 2018). A broad extent of activity can be found under the network
intrusion covering accessibility to files that are not authorized or privileges.
Electronic Devices
Officials of law enforcement often find cell phones, PCs and other electronic gadgets
as they are examining a crime, gathering proof and arresting suspects. These electronic gadgets
can store information that can be helpful to police in deciding the chain of occasions advancing
to crime or to data that could give observational proof that is possible to result to imprisonment
like location pints, data that is implicating, and photos. PC of an individual and their utilization
of network services are viable social archives that hold more data about the desires and conduct
of the person (Fahlevi et al., 2019). This makes individual gadgets owned by accused an ideal
proof simply like the chat logs and history of the browser. Cell phones with capacities that are
profoundly evolved like those of PCs are emerging in more individuals' pockets, purses and
briefcases consequently making them appealing focuses for attackers.
These gadgets permit users to handily gain access to the internet, their email, and
explore by means of their GPS. Unfortunately the defenses of the smartphones has not kept up

“DIGITAL FORENSIC INVESTIGATION”

5

step related to the regular PC security. Methods of technical security, for example, antivirus,
firewalls and encryption are uncommon on cell phones notwithstanding their working
frameworks not being as modern as a PC. It is not difficult for attackers to gain access to other
networks and their gadgets because of these reasons. It is fundamental to remember when
managing electronic gadgets during an examination to follow all the set techniques with the
goal that the information on the said gadgets doesn't get changed or deleted. The essential rule
that ought to be followed during examinations ought to be to keep up evidence that signifies
that it ought not be meddled with or spoiled.
Network Equipment
Network gadget in any other case called computer networking gadgets are equipment
used to connect with net, different networks or other computers, firewalls, routers or modems.
Routers are huge apparatuses that can be used by investigators to investigate crimes in mild of
the reality that a router this is related to a community can assist the examiners with confirming
any hardware that has been operated on a network and moreover the type of traffic coursing
through the router. Router typically ship packet of IP starting with one agency then onto the
following, they connect networks collectively and routes traffic amongst them and that they
allow the internet to come back via on your PC as webpages, downloaded files and emails.
It is suggested to now not reset the router underneath investigation considering that that
cycle may additionally junk any evidence that was added by the attacker. The sort of facts that
can be extracted from a router comprise, display access listing, show clock, show IP course,
show up configuration, display person and show model. Firewalls are moreover excellent
element of investigators to utilize given that the firewall log documents follow all the outgoing
and incoming events within the community and its contents can contain points of interest about
attacks and tries of infiltration into the network. The log files turn out to be feasible assets of

“DIGITAL FORENSIC INVESTIGATION”

6

proof which could lead an examination toward the man or woman of the attackers. This is
feasible in mild of the reality that firewalls are the sole passage and go out points of a
community in an employer. The primary statistics contained in firewall log files is a
fundamental supply of proof for the assessment and instrument to find the PC crimes.
Malware Installation
Malware encompass viruses, spyware and in addition undesirable software program
that becomes hooked up on pc systems or digital gadgets without the owner’s approval. The
packages now and again pressure the tool to crash to be monitored and to have the web hobby
controlled (Maciejak & Tran, 2020). Malware permits crook attackers to gain get entry to and
manipulate over a device to scouse borrow private records of persons, dedicate crime and send
junk mail. Systems and networks can be compromised and exposed through malware called
botnet that takes over special systems through assaults which can be synchronized.
Programs of malware can be set up on systems or laptop systems by means of linking
hidden malicious code in a file that is harmless or utility. Some of the techniques and strategies
of malware detection encompass time stamping, entropy analysis and key terms and identifiers.
After scanning the system for malware, there are 3 feasible effects that an investigator can get
a fake poor- whilst a detector fails to expose a particular malicious code in a site that is
inflamed, a faux-effective even as a scanner identifies malware in a non-inflamed report and
hit ratio- even as the indicator as it need to be discovers the malware.
Computer Systems
Computer systems include difficult drives, keyboards, displays and monitors for
example, computer, servers and laptops. Those structures had been set up as crucial a part of
evidence observed and used for investigations, in addition the growing storage room can truely

“DIGITAL FORENSIC INVESTIGATION”

7

be a strong supply of digital verification. The...


Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags