Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Advanced Digital Forensic Investigations Unit 1 IP, Essay Example

Pages: 3

Words: 959

Essay

The digital world has expanded to new horizons, enabling business to be more dependent on technologies. Today, every medium size or corporate organizations acquire information systems for delivering business automation and business value. Moreover, digitals channels are now a part of organization’s marketing strategy and services. Every organization is curious to make a presence on the web. Financial institutions have now introduced new ways of doing banking online. For instance, banks have introduced online or Internet banking that is considered being value added services for the customers due to its convenience. On the other hand, these value added services that are operational on the web, have many risks associated with them. For instance, hacker or cyber-criminal can retrieve anyone’s user credentials, in order to transfer funds. Moreover, large online transactions can also be interrupted resulting in a major financial loss. Similarly, Internet Service Providers (ISP) provides Internet services to organizations and home users. If the ISP security controls are not adequate, this may result in a system compromise that may affect the home users, as well as the organization. Consequently, organizations need to eliminate or mitigate business risks, as well as technological risks that may affect business value.  In order to prevent or mitigate these risks, organizations may implement forensic tools that may monitor and review semantics related to any incident within the organization. However, the key aspect is to protect organization’s critical assets. If the organization fails to protect them, business value cannot be delivered and hence organization cannot achieve its goals and objectives. There are many tools and methodologies for mitigating risks, threats and vulnerabilities.

IDS is abbreviated as Intrusion Detection System. Network Dictionary defines it as “Intrusion detection system (IDS) is a type of security management system for computers and networks. An IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions and misuse”. However, IDS is now available in several flavors. Two of them are Signature based IDS and Anomaly based IDS. Organizations may choose the best option as per requirements, as the key objective is to protect critical assets. Signature based IDS is not considered to protect the organization’s information assets from any new threat, as it operates on the provided signatures. Whereas, anomaly based IDS monitors the network and reports when an unknown or irrelevant activity is found within the network. Snort was previously a tool that is now converted as IDS. What is Snort? It is defined as “An open source network intrusion detection system (NIDS) that is noted for its effectiveness. Developed by Martin Roesch, Snort can also be used just as a packet logger or packet sniffer” (Snort.2011).

Previously, forensics may not involve computing devices for investigation processes. Today, the involvement of computing devices is stretched to a great extent. People are now dependent on technology and so are organizations. Likewise, today the new term known as digital forensics is on the rise, as it encompasses new tools and methodologies utilizing computing power. Moreover, law enforcement agencies also facilitate investigators by granting access to systems of service providers, in order to detect victim footsteps.  Similarly, in organizations, if any personnel are involved in an internal crime executed from a computer, logs, audit trails and storage devices can provide sufficient data for detecting the source (Computer Forensics – a Critical Need in Computer. (n.d.))

One of the methods of conducting digital forensics is data dictionary extraction via Log miner tool. For instance, if a forensic investigator is examining a log file named as ‘redo’ that is located within similar database, this method can be deployed for sparing ‘redo’ log file or a file named as ‘flat’. However, data extraction of isolated data within the data dictionary is executed by the following command DBMS_LOGMNR_D package. This command is used because it provides several benefits listed below:

  • Isolating file extraction of flat files within the data dictionary
  • Isolating file extraction of ‘redo’ log files within the data dictionary

Moreover, the command file containing package also provides outcomes related to procedures via a command ‘DBMS_LOGMNR_D’ package. Likewise, the result of the procedure is named as ‘PROCEDURE BUILD’  ‘PROCEDURE SET_TABLESPACE’ and ‘IDENTIFYING REDO LOG FILES’. The Log miner tools will read the files that are located in the ‘redo’ log files, as the information in these log files is a result of extraction of data dictionary (TOO CLEVER FOR WORDS: ORACLE9I LOG MINER – ORACLE, n.d).

Another effective tool that is used by digital forensic practitioners is ‘Windump’. It is a “freeware tool for Windows that is a protocol analyzer that can monitor network traffic on a wire” (Windump.2007). The objective of this tool is to examine the network activity and generate alerts based on the criteria set. Moreover, the tools is specifically designed for forensic investigation, as it can also examine live broadcasting from any network node that may be infected by malware or virus.

Conclusion and Future Works

We have illustrated the prime importance of digital forensic tools that may enhance network forensic investigation. As these tools and devices have the intelligence to compete with potential threats, they are considered as mandatory for investigating cases and collecting evidences related to crimes executed from computing devices. We have illustrated the methodology of investigating database forensics by a digital forensic tool known as log miner, Snort and Windump. As organizations are curious to make their business process automated, risks related to security incident are also increasing. Therefore, mandate for forensic investigators is increasing (Computer Forensics – a Critical Need in Computer. (n.d.)). .

References

Intrusion detection system. (2007). Network Dictionary, , 258-258.

Snort.(2011). Computer Desktop Encyclopedia, , 1.

Computer Forensics – a Critical Need in Computer. (n.d.). Retrieved from http://www.scribd.com/doc/131838/Computer-Forensics-a-Critical-Need-in-Computer

Too Clever for Words: Oracle9i Log Miner – Oracle. (n.d.). Retrieved from http://blogold.chinaunix.net/u/3787/showart_26417.htm

Windump.(2007). Network Dictionary, , 528-528.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Human Trafficking, Research Paper Example

Human trafficking is definitely one of the most severe problems in contemporary society. “Annually, about 600,000 to 800,000 people – mostly women and children –are [...]

Pages: 4

Words: 1058

Essay

Alternatives to Imprisonment, Essay Example

What alternatives to imprisonment exist to deal with non-violent criminals who are repeat offenders? The populations of prisons around the world and United States in [...]

Pages: 1

Words: 270

Essay

Immunity, Essay Example

What is meant by immunity? What are types of immunity? How does it work to insulate a defendant from criminal prosecution? “In legal contexts, immunity [...]

Pages: 1

Words: 259

Essay

Unappreciated Heroes, Essay Example

Though viewed by many as a great bastion of upward mobility for the black people and other minorities, the United States armed forces have not [...]

Pages: 5

Words: 1445

Essay

Hepatitis C, Essay Example

In fact, Hepatitis C is a liver disease, which is caused by Hepatitis C virus, so called HCV infection. “HCV infection sometimes results in an [...]

Pages: 3

Words: 710

Essay

Plato’s The Apology, Essay Example

Plato’s The Apology is a description of the speech, which Socrates makes at the trial when charged with not acknowledging the gods accepted by the [...]

Pages: 5

Words: 1264

Essay

Human Trafficking, Research Paper Example

Human trafficking is definitely one of the most severe problems in contemporary society. “Annually, about 600,000 to 800,000 people – mostly women and children –are [...]

Pages: 4

Words: 1058

Essay

Alternatives to Imprisonment, Essay Example

What alternatives to imprisonment exist to deal with non-violent criminals who are repeat offenders? The populations of prisons around the world and United States in [...]

Pages: 1

Words: 270

Essay

Immunity, Essay Example

What is meant by immunity? What are types of immunity? How does it work to insulate a defendant from criminal prosecution? “In legal contexts, immunity [...]

Pages: 1

Words: 259

Essay

Unappreciated Heroes, Essay Example

Though viewed by many as a great bastion of upward mobility for the black people and other minorities, the United States armed forces have not [...]

Pages: 5

Words: 1445

Essay

Hepatitis C, Essay Example

In fact, Hepatitis C is a liver disease, which is caused by Hepatitis C virus, so called HCV infection. “HCV infection sometimes results in an [...]

Pages: 3

Words: 710

Essay

Plato’s The Apology, Essay Example

Plato’s The Apology is a description of the speech, which Socrates makes at the trial when charged with not acknowledging the gods accepted by the [...]

Pages: 5

Words: 1264

Essay

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!