Verified Document

Search Warrant And Database Research Paper

Digital Forensics and Cyber Crime Investigation HCC Partner is the top healthcare company in the United States, and the management has noticed an intrusion in the systems based on the alerts from their IDS (Intrusion Detection System) logs that causes the management to question the reliability of the system. Analysis of their systems reveals that HCC uses the Snort IDS that is running in Linux system. Moreover, the HCC database administrator has received and downloaded the strange email from the Human Resources Department, which makes the system behaving strangely after they open the attachment.

The objective of this project is to analyze the HCC database server, the network system and other workstations suspected leading to data leakage. The project will investigate whether there is a possibility of evidence of data breach.

A: Plan for Processing the Incident Scene and Potential Crime

The study uses the staircase model for the investigation processing because the model assists in enhancing a practical method for forensic investigation....

Method to Identify Potential Digital Evidence
The first strategy to identify the potential evidence is to trace the source of email attachment from the human resource department. Essentially, all the emails communication and attachment will be stored in the database server. The next step is to the check the hard disk of the human resources computer to verify whether the email is sent from the HR department. The method to verify whether the email comes HR department is to search the company database server for all the emails sent to the database administrator the day the email is received. While email searching carried out manually can be time-consuming, however, we suggest using the X-Ways Forensics software for the automatic searching for the email.

If the email in the hard disk r database is deleted, the next process is to use the forensic software to recover the email deleted on this data. The study suggests using the Encase software to assist in retrieving the deleted emails. The tool has the ability to collect data from various devices, and assist in unearthing the evidence. If the file is sent from HR department, the next step is to scan the file to detect the presence of malicious software. The study suggests using one of the premium antivirus software to identify whether the file contains the malware and if the…

Sources used in this document:
The next step is to develop a documentation of the evidence. The study suggests using the digital camera take the photos of all the evidence. The photo must ensure 360-degree coverage of the scene. The photo must reveal the location of all the seized computer systems. The front, back, and, side by all photos must photograph. However, there is a need for a videotaping of the active screen monitor. The photographs should reveal the position of mice, computer components, cables and other evidence.

Reference

Casey, E. (2011). Digital evidence and computer crime: forensic science, computers and the Internet. Waltham: Academic Press.
Cite this Document:
Copy Bibliography Citation

Related Documents

Patho-Physiological Condition of Schizophrenia Searching
Words: 2888 Length: 10 Document Type: Thesis

Kringlen also published more extensive case records for his monozygotic twins than any other researcher had done (pp. 7-8)." The information gained by these studies was significant. One, in particular, conducted by William Pollin and his colleagues set out to disprove the biological or genetic factors, and to establish the basis for.".. psychodynamic, interpersonal phenomena that might have some significant etiologic role with respect to schizophrenia (Torrey, p. 9)." What

Curfew Policy
Words: 2990 Length: 9 Document Type: Research Paper

Curfew Policy Description of policy Problem/need identification Development of policy Evaluation of policy It is unquestionable to claim that the world is progressively advancing and entering into the epoch of developments. However, it is very unfortunate to state that the social issues especially juvenile delinquency at the same time is increasing at an accelerated pace. This apparently indicates the fact that youth violence over the years have raised to a much greater extent. In fact,

Nurse Satisfaction in Magnet Hospitals Which Three
Words: 572 Length: 2 Document Type: Essay

Nurse Satisfaction in Magnet Hospitals Which three databases will you use? CINAHL Academic Search Nursing & Allied Health Collection Search each database, using key words, for relevant research on this subject. What key words did you use in the Search Strategy fields? Include all attempts and limitations used to refine your search. Magnet hospital Nurse + contentment Nurses + satisfaction Report the number of citations identified from each database in the number of articles found field. ,200; 15,01; 15,991 ,000; 29,000;

Patriot Act in Regards to Its Authorization
Words: 2764 Length: 9 Document Type: Research Paper

Patriot Act in Regards to Its Authorization of Surveillance and Search and Seizure The Patriot Act: The Patriot Act was enacted into law in 2001 to unite and strengthen America through the provision of suitable tools that are necessary to interrupt and barricade terrorism acts. This legislation was established with the dignified intention of identifying and indicting international terrorists operating on the United States' soil ("USA Patriot Act," n.d.). The Act, which amended

Welcome to Homicide Case "Welcome to Homicide"
Words: 2613 Length: 8 Document Type: Essay

Welcome to Homicide Case "Welcome to Homicide" "There's a theory that every time you leave an area, you always leave evidence behind, no matter what, no matter how careful you are; and that's why there's forensics" (Santy, 2007). Forensic science has seen a number of major developments over the years. Throughout its evolution, analytic techniques have become finer tuned and accurate, allowing for much greater law enforcement practices. Today, forensics relies

Employee Privacy Torts
Words: 7119 Length: 25 Document Type: Research Paper

Employee Privacy Torts Issues relating to employee privacy have been at the forefront of businesses for many years. This has been fuelled by the dynamic workplace which changes constantly and also by employees and employers being more litigation-conscious. Technology has also spurred on employee privacy issues with e-mail and the internet being related to heightened concerns about vulnerability of employers to litigation. Many employers have thus exacerbated their concerns relating to

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now