29 Sep 2022

47

Forensic Processes and Techniques in Cybersecurity

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 1129

Pages: 4

Downloads: 0

Computer crimes can be the trickiest most of crime in the investigation process. This is because the perpetrator knows all too well how to manipulate the systems and leaves them in such a state that if the investigators do not cautiously handle the tampered systems they could not only lose the track they have on the perpetrator, but they also risk more confidential information that would be considered to have been left in a vulnerable state. As such, it is critical that the forensic involved be of certain level and criteria to help in the disarming process and the retrieval of crucial information without necessarily having to expose sensitive information on the server in question. 

With this in mind, the forensics process and steps to be taken by an examiner in this case to identify the theft and computer crime should entail the policy and procedure development. Whether related to malicious cyber activity, the intent to commit a crime, or criminal conspiracy, digital evidence could be delicate and highly sensitive. Cybersecurity personnel better understand the value of this information and respect the possibility that it can be easily compromised if not cautiously handled and protected. For this possibility, it is critical to establish and follow strict guidelines and procedures for activities related to computer forensic investigations. These procedures should include detailed instructions about when computer forensics investigators are authorized to recover potential digital evidence, and how to adequately prepare systems for evidence retrieval (Rowlingson, 2004). The second process is evidence assessment. A vital component of the investigative process involves the evaluation of potential evidence in cyber-crime. Chief to the effective processing of evidence is a clear understanding of the details of the case in question. As such, the cyber-crime at hand needs to be classified. In this case, to prove that identity theft has been committed, computer forensics investigators use highly sophisticated methods to sift through hard drives, social networking sites, email accounts, and other digital archives to retrieve and assess any information that could serve as viable evidence of the crime. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The third step is evidence acquisition. It is correct to point out that the most critical facet of a successful computer forensic investigation is a detailed, rigorous plan for acquiring evidence. Extensive documentation is needed before, during, and after the acquisition process; detailed information must be recorded and preserved, including all hardware and software specification, any systems used in the investigation processes, and the system being investigated. After evidence acquisition, there is the evidence examination process that is key to investigate the potential evidence adequately; procedures must be in place for retrieving, copying, and storing evidence within appropriate databases. Investigators, in this case, examine data from designated archives, using a variety of methods and approaches to analyze information which could include utilizing analysis software to search massive archives of data for specific keywords or file types and procedures for retrieving files that have been recently deleted. The last step in the forensic process and steps are documenting and reporting. After all the data and information in the form of evidence is obtained, it is fully documented and stored for reporting (Kohn, Eloff, & Eloff, 2013). It is essential for computer forensic investigators to keep an accurate record of all activity that is related to the investigation, including all methods used for testing system functionally and retrieving, copying, and storing the data, as well as all actions taken to acquire, examine and assess evidence. 

The two types of authentication that are acceptable in the investigative process of identity theft, in this case, include usernames and passwords. This is because identity theft is the process of impersonation, claiming another person's identity. As such, authentication put in place would refer to the process of confirming something or in this case someone, as being authentic and real. In reference to this, usernames and passwords are examples of authentication for online or digital files. The username could be a person's given name, their login number into a system, or their reference number in the said systems. The password, on the other hand, is usually a string of characters. These characters could be numbers, letters and perhaps punctuations and symbols that are assigned by the institution, or in most cases chosen by the employee or personnel authorized to access the systems, files, and folders in question. In simple terms, online authentication uses a single authentication factor based on information already known. This is important and comes into play when somebody else commonly referred to as an intruder or perpetrator tries to sign into the system. Since their information is not always recorded or fed into the system, they tend to pass as the people authorized to access these systems by stealing their login credentials to act as their identity. 

In simple terms, they assume the person who is allowed to access these systems and files. In establishing identity theft, the forensic investigators would have to prove that indeed it was not the authorized personnel that signed into the systems, and that a third party had stolen or manipulated their login credentials. Such acts include breaking into their server and accessing information from that point or feeding in their usernames and passwords into the systems thereby gaining the access the authorized personnel would have otherwise have located, in reducing such incidents of identity theft, the second example of authentication is biometrics. This is the use of fingerprint scanners to access online systems and folders. Highly advanced and sophisticated systems use fingerprints, rather than usernames and passwords since these cannot be easily manipulated, and it would be easy to note when an intruder tries to break into the systems (Jain & Nandakumar, 2012). Examples of a chain of custody techniques of digital evidence include hardware information, which could include photos, serial numbers, asset ID and hostname, and digital data such as filename and md5 hash. 

The other aspect of forensic processes and techniques is the legal provisions of the First and Fourth Amendments as far as the identity theft investigation is concerned. According to these provisions, it is illegal to use electronic surveillance devices in identity theft according to the First Amendment since it violates the freedom of speech and press. It is also unlawful according to the Fourth Amendment where is considered an unreasonable form of searches and seizures. However, private searches and surveillance in identity theft are deemed legal by the Fourth Amendment if such an act is caused by a private individual who is not acting as a representative of the government or with the involvement or knowledge of any government official. What this means is that to some extent the act is legal, though in this case, it is not because the federal law enforcement agency is a body of the government. However, it is legal to place a tracking device according to the Fourth and First Amendments on people or groups of people suspected to be cybercriminals if there is a substantial probability that the assumptions are correct. This happens mostly in cases of luring cybercriminals into traps where they are later nabbed (Kerr, 2009). This act is considered legal since it is geared towards apprehending specific cyber culprits and as such does not infringe into the space and privacy of any other person; instead, it is directed and focused on only a particular people, or groups of people. 

References 

Jain, A. K., & Nandakumar, K. (2012). Biometric Authentication: System Security and User Privacy. IEEE Computer , 45 (11), 87-92. 

Kerr, O. S. (2009). Applying the fourth amendment to the internet: A general approach. Stan. L. Rev. , 62 , 1005. 

Kohn, M. D., Eloff, M. M., & Eloff, J. H. (2013). Integrated digital forensic process model. Computers & Security , 38 , 103-115. 

Rowlingson, R. (2004). A ten step process for forensic readiness. International Journal of Digital Evidence , 2 (3), 1-28. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Forensic Processes and Techniques in Cybersecurity.
https://studybounty.com/forensic-processes-and-techniques-in-cybersecurity-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 166

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration