All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Network Forensics, Essay Example

Pages: 3

Words: 831

Essay

Introduction

Internet Crime and particularly illegal entry into other computer systems i.e. hacking is deemed to be a Federal Offence in the USA and falls under the investigative jurisdiction of the Federal Bureau of Investigation (FBI).  Criminal computer hacking has been legally defined as any person who willingly and knowingly commits an act of cyber terrorism, credit card fraud, malicious vandalism, identity theft or other cyber-crime by hacking into a Corporate or Government system.  Such criminal acts are treated very seriously in the USA and will be subject to harsh penalties.  Such intrusions are capable of creating a tremendous amount of malicious damage.

In the subject of Identity Theft this has taken on added dimensions with the large amount of confidential personal data retained on computer systems.  This makes such systems vulnerable to cyber crime.  (Seger, A. 2007)

Identity theft

With computer systems the concept of identity theft can be placed into three broad categories:

  1. Where information or data is extracted through a physical theft from the computer systems. This being achieved by such methods as hacking, illegal external entry, phishing or internal theft;
  2. Where Identity information is acquired illegally from a system and subsequently sold for illegal purposes i.e. credit card theft, bank teller machines, false identification cards, fraudulent acquisition of goods
  3. Where Identity information is extracted with the deliberate attempt to commit fraud. This covering a comprehensive list of unlawful activities.

Identity Theft Investigation

Fig 1 describes the Forensic investigation steps that were followed in the examination procedures of an Identity theft. The investigation defined the incident in terms of how the ID theft was accomplished, the information that was stolen (accessed), the location of the data on on the system, the severity and sensitivity of this information, the security safeguards that were initially presented on the data i.e. encryptions.   The Media Analysis comprising the physical observation and examination of the system.  The Evidence Analysis that which indicates physical intrusion and attack on the system resulting in material theft and or damage to the system. Forensic evidence is collected at this point including digital imaging of appropriate back up systems.  Scenario Construction attempts to trace the events that took place and look for forensic trails that lead to the source of the attack.  This means tracking to computer IP addresses, tracing stolen documents or records, examination of criminal records that may provide clues to the attack looking at similarity indexes.   Evaluation looks at the results from previous stages and consolidating the results into a single outcome of the investigation.

Forensic Investigation Steps

This investigation  produced :-  A Network intrusion report  order to show information concerning the intruder to the system i.e. the IP Address, access details etc. In addition security information  provided  by the  Network  Security software that might include such items as access times and the type of data accessed. A physical sector image report , essentially a duplicate of the existing system that can be used for forensic examination purposes. A Network Security Audit , primarily a verification exercise that examines vulnerabilities and weak access points in the system.  In addition examination of the security elements of the systems that include such items as firewalls, virus protection, encryptions and details on any hardware vulnerabilities.

The investigation used a sophisticated software forensics tool called X-Ways Forensics and described as “a powerful disk analysis tool: capturing free space, slack space, inter-partition space, and text, creating a fully detailed drive contents table with all existing and deleted files and directories and even alternate data streams (NTFS), Bates-numbering files, and more.” (XWays-Forensics, 2011). Investigations focused on specific network problem areas:

Rogue Wireless Area Networks:  This is where someone may introduce an additional router to your network and thereby gain access to the wider network.  This is essentially a hardware intrusion.  Software applications like Network Magic will detect and report such intrusions to the network administrator.

Spoofing Internal Communications:  This is a direct attack and intervention from outside computers wishing to gain access to your system.  They simulate internal domains and essentially look harmless on the network maps.

Direct Theft of network resources:  This is where your system is hacked and the intruder steals bandwidth to surf the internet.  They can then indulge in a variety of illegal activities that indicates the source as your network.  i.e. downloading pornography, music, video clips etc.  Degradation of your network performance is an indication of this type of attack. (Bradley, 2007).

Conclusions

This was the result of an individual hacker that had a previous criminal record for conviction of similar offences.  Forensic trails located his IP address and location of operation. Police records cross-referenced via a similarity index and subsequent investigation resulted in physical evidence being obtained on stolen material located on the identified computer.

References

Bradley, T. (2007, 12 6). Secure your wireless network. Retrieved 11 25, 2011

Seger, A. (2007). Identity theft and the convention on cybercrime. Courmayeur, Italy: United Nations ISPAC.

XWays-Forensics. (2011, 11 28). Network Intrusion Software. Retrieved from XWays-Forensics: http://x-ways.net/winhex/forensics.html

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Relatives, Essay Example

People have been bound by bloodline and kinship since times immemorial. This type of relation is much more complex than being simply unified by common [...]

Pages: 1

Words: 364

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

Relatives, Essay Example

People have been bound by bloodline and kinship since times immemorial. This type of relation is much more complex than being simply unified by common [...]

Pages: 1

Words: 364

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay