Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Computer Forensic Investigation Plan, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Company X suspected an employee had copied files from the company intranet for unauthorized purposes. Upon searching the employee’s purse, the department manager found a flash drive which he believed may contain the unauthorized files. The following is an overview of the plan to conduct a forensic analysis of the drive. The forensics plan is divided up into several steps, or phases, each with its own set of criteria. While each forensics analysis is different, there are some basic components to any analysis that are present in most cases.
Initial Steps
Before beginning a forensic analysis, there are a number of concerns that must be addressed. It is important to determine the legal cope of the investigation, which likely includes the need to obtain search warrants and to make other legal arrangements. The scene itself must be processed, including indentifying the computers that may have been compromised, and photographs and other documentation of the scene should be collected. Computer systems should be imaged to ensure that during the analysis the activity and user information is preserved and available. In most cases, the analysis will be conducted on working copy of the imaged device(s).
Beginning the Analysis
Using certified forensic computer equipment, the first step of the analysis is the acquisition of the data on the digital source –in this case, the flash drive that is suspected of containing unauthorized files. After connecting the digital source to the forensic interface, the data is retrieved using an acquisition tool; this data is then saved to the destination object as a clone of the original data. The most important considerations during the acquisition process are completeness and accuracy; simply put, it is necessary to ensure that all of the information is acquired, and that it was done so correctly.
Creating Lists
Generally speaking, the forensic analysis process involves the creation of several lists; as the process continues, one list feeds into the next, leading to the conclusion of the process. The first list is the “Search Lead List.” This list is based on the information that has been identified as the object of the search, as well as additional possibilities that arise during a cursory examination of the retrieved data. At this stage, the Search Lead List will be indentified as “Search for Company Files.” As data is examined and processed, it is transferred to the second list, the “Extracted data List.”
The next stage in the process is Identification, wherein the retrieved data is examined and indentified to determine whether or not it is relevant to the search. Each piece of data is indentified by file type or other appropriate identifier, and once a determination of relevancy is made, the data is then transferred to the Relevant Data List, or if it is simply marked as processed so investigators can move on to the next bit of data.
During this stage, it is possible to find other incriminating data or other information; if such data is found, it is typically best to halt all activity while a legal determination is made. As is the case with many types of searches, it may be necessary to broaden the scope of the search warrant, or to acquire a new warrant. Forensic analysis is a dynamic process, and investigators must be flexible and prepared to respond to new or unexpected information as it arises. For example, the search of the flash drive found in the employee’s purse may also contain email addresses or other information that indicates the employee shared, or planned to share, the unauthorized information. An expanded investigation might include getting a subpoena for emails sent to or received from the addresses found in the flash drive. New information that is discovered at this stage is transferred to a New Source of Data List; this list may then be used to refine or expand the Search Lead List, thus continuing he process until all sources of information are exhausted.
Initial Determinations
Depending on the complexity of the data, the amount of data retrieved, and the implications of the uncovered data, it may be possible to end the analysis at this point. If the evidence of guilt is overwhelming (for example if the flash drive found in the employee’s purse contains a significant amount of unauthorized company files), a prosecutor or other legal authority may decide that he or she has enough evidence to move forward with a legal case. In the event that legal proceedings are deemed unnecessary, it may still be possible at this point to make a determination about how the company will handle the matter in terms of punishment or termination. If the data is inconclusive or insufficient to make a determination about how to deal with the employee, further analysis may be needed.
Analysis
In this instance, it is unlikely that a complex analysis of the Relevant Data List will be needed; if the flash drive contains unauthorized files, that is most likely all that will be needed to determine whether to proceed with punitive or legal action against the employee. In a more complex case, it may be necessary to further examine the evidence. Analysts will look for information that will help to determine such things as who accessed particular files, when those files were accessed, and what sort of timeline can be determined based on the available evidence.
Even in a seemingly straightforward case such as this one, it is possible that the analysis will uncover information that is not expected. It is possible, for example that the analysis will determine that the suspected employee with the flash drive was not the only person who gained unauthorized access to sensitive materials. Such possibilities reinforce the notion that forensic analyses are dynamic by nature; the discovery of new information may serve to further expand the scope of the investigation, necessitating a return to the process of developing and refining the Search Lead List and the subsequent lists used to analyze the data.
Conclusion
Once the analysis is complete, a final list, the Analysis Results List, is prepared for presentation. In this instance, the information is fairly straightforward: the flash rive has been determined to contain unauthorized files and a list of all the relevant data found on the drive is presented. The conclusion of this analysis will present all of the information available about when and how the employee accessed and downloaded the information. A more complex case would also lay out all of the information about anyone else who may have been involved in accessing the unauthorized information, along with any appropriate charts or other tools that connected the dots among those involved, how the information was transmitted and stored, and any other relevant information.
Further Considerations
Did the manager have a legal right to search the employee’s purse? Explain.
While workers have a reasonable expectation of privacy, there are some circumstances under which it is acceptable to search an employee’s belongings. The standard is more restrictive for government and public organizations; it is less so for private organizations. Ultimately a judge may determine whether the search was legally permissible; it is best for an employer to make an effort to determine the need for a search through oher means, such as surveillance footage that shows an employee stealing, for example. In this instance, the suspected employee may have left an electronic record of her unauthorized activity, which may serve as the basis for a reasonable search.
Does the alleged activity constitute a crime? Explain.
This is a difficult area of determination. The company’s AUP did not prohibit personal use of company files, but it did prohibit their removal from the promises. The employee was not found to have removed the files from the premises, so technically she did not violate the AUP. Data theft is, however, still a crime, and it is likely that the employee could be prosecuted, especially if further investigation determined that she had taken files off premises at other times.
Assuming that a crime may have been committed, what steps should be taken in initiating the investigation?
In this instance, the manager may have acted inappropriately by conducting a search of the employee’s purse without permission. According to the available information, however the company did then contact law enforcement, which would be the appropriate next step.
What are the critical considerations in assembling the body of evidence?
The primary consideration in this investigation was to acquire the flash drive containing the unauthorized files. The forensic report will contain the bulk of the necessary evidence, as it will demonstrate how and when the employee accessed the information, as well as information about who else may have acted in a similar fashion.
What are your legal and ethical responsibilities as a system forensics professional and expert witness?
The computer forensic analyst has an ethical duty to correctly identify and document the incident in question. He or she must adhere to standards of accuracy and authenticity, and must be well-versed in the expertise needed to conduct forensic analyses. Forensic equipment must be properly maintained and used, and proper documentation of all steps of the process must be carried out.
Analyze and explain the employment of any and all computer forensics tools used in your investigation.
In this investigation, the primary tools used were in the process of creating the digital image of the original flash drive and the forensic interface used to analyze the data. It was a fairly simple examination, where the main consideration was simply to determine if unauthorized files existed on the flash drive.
References
Carroll, Ovie et al. Computer Forensics: Digital Forensic Analysis Methodology. Computer Forensics 56(1). January 2008 http://www.justice.gov/usao/eousa/foia_reading_room/usab5601.pdf
Digital Data Acquisition Tool Specification, NIST.http://www.cftt.nist.gov/Pub-Draft-1-DDA-Require.pdf
Guerin, Lisa. Workplace Searches: Dos and Don’ts. http://www.nolo.com/legal-encyclopedia/workplace-searches-dos-donts-29770.html
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee