Global Forensics Inc., Essay Example

Pages: 1

Words: 336

Essay

When collecting forensic evidence, after a cyber-attack, there are a number of legal constraints that need to be confronted.  First relates to that of confidentiality; there maybe numerous data files that are classified or highly confidential and the victim does not want the forensic investigation team to see these.  This may include both attacked files and those that already remain on the system.  This has to be carefully assessed but one approach has been to quarantine private areas.  Legal determination is often based upon existing case law and this can be problematic in new types of cyber-crime. This often brings into play the need for Expert witnesses or subject matter experts to assist the judge in legal interpretation of events. (Burmester, M. 2004)

In the acquisition of evidence in computer forensics it often includes gaining of access to the victims hard drive.  In addition screen captures and details of system configuration files.  Very often the forensic evidence is extracted from the duplicate backup system as opposed to the actual compromised system.  The objective being to prevent any tampering on the already compromised system and corrupt the integrity of any evidence.  Investigators can use the IP data trail to discover the ESI.  (Bui, 2003)

The data mapping process commences with getting a list of all the systems that are used by the Company. This includes a complete communications mapping of virtual servers, existing servers, networks, databases, external interfaces etc.  Then obtain an inventory of the business processes ensuring that all of the ESI is fully documented.  It will be necessary to collect a list of all users and their access privileges. Collect all systems documentation including Data Models, Work flow charts, business process charts.   This information is then embodied into a Forensics report   The digital evidence  then provides the requisite facts describing the events leading up to a computer related incident.   (AIIM, 2009)

References

AIIM. (2009). Data Mapping. Infonomics, 1-5.

Bui, S. E. (2003). Issues in Computer Forensics. COEN.

Burmester, M. K. (2004). Tracking cyberstalkers: a cryptographic approach. Tallashee Fl: Florida State University.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Machiavelli, Essay Example

Introduction Most of Machiavelli’s advice, as portrayed in ‘The Prince’ largely disregarded any moral or ethical viewpoints.  In his ability to take control of lands, [...]

Pages: 1

Words: 758

Essay

Introduction to Human Rights Law, Essay Example

1: The distinction between negative rights and positive rights is deeply grounded in the philosophical tradition. Negative rights are defined by the negative duties that [...]

Pages: 1

Words: 4881

Essay

The Obesity Epidemic: Helping America’s Children, Essay Example

Obesity amongst American children has risen drastically over the last thirty years due to shifts in eating habits and attitudes about exercise that promote fast [...]

Pages: 1

Words: 1510

Essay

Knowledge Management in Army, Essay Example

I am a huge believer in learning from others so interactions and discussions with my colleagues will be an important part of my knowledge management [...]

Pages: 1

Words: 562

Essay

Strategy-Implementation Efforts, Essay Example

Strategy-implementation efforts can determine the overall success or failure of a business.  Having a great product or service is not enough; if it is not [...]

Pages: 1

Words: 351

Essay

Performing a Projected Financial Analysis, Essay Example

Projected Financial Analysis or Strategy Evaluation in an organization are tools of vital importance that facilitate determination of overall organizational performance. Important components of strategy [...]

Pages: 1

Words: 312

Essay

Machiavelli, Essay Example

Introduction Most of Machiavelli’s advice, as portrayed in ‘The Prince’ largely disregarded any moral or ethical viewpoints.  In his ability to take control of lands, [...]

Pages: 1

Words: 758

Essay

Introduction to Human Rights Law, Essay Example

1: The distinction between negative rights and positive rights is deeply grounded in the philosophical tradition. Negative rights are defined by the negative duties that [...]

Pages: 1

Words: 4881

Essay

The Obesity Epidemic: Helping America’s Children, Essay Example

Obesity amongst American children has risen drastically over the last thirty years due to shifts in eating habits and attitudes about exercise that promote fast [...]

Pages: 1

Words: 1510

Essay

Knowledge Management in Army, Essay Example

I am a huge believer in learning from others so interactions and discussions with my colleagues will be an important part of my knowledge management [...]

Pages: 1

Words: 562

Essay

Strategy-Implementation Efforts, Essay Example

Strategy-implementation efforts can determine the overall success or failure of a business.  Having a great product or service is not enough; if it is not [...]

Pages: 1

Words: 351

Essay

Performing a Projected Financial Analysis, Essay Example

Projected Financial Analysis or Strategy Evaluation in an organization are tools of vital importance that facilitate determination of overall organizational performance. Important components of strategy [...]

Pages: 1

Words: 312

Essay