Preview

Cis 417 Assignment 1

Good Essays
Open Document
Open Document
755 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cis 417 Assignment 1
Assignment 1:
CIS 417
Professor DR. Ed Lindoo

As a system forensics specialist I am here to help your business achieve goals based on security and confidentiality. Some of my basic tasks and high level investigation process is to use evidence to reconstruct past events and activities. Forensic specialist also use evidence to gain a better understanding of a crime (John R. Vacca & K Rudolph, 2011). I will also use this evidence to show possession and handling of digital data.
There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They
…show more content…
The fact that by time a lot of the evidence is examined it’s normally too late and can’t even be used. A lot of forensic examiners do not understand investigation, causing them to overlook relevant information and expand resources (Charles L Cohen, n.d.). This is why training is so important but lack of funds can be another limitation because there is only so much money to spend on training and resources.
Computing devices are used in crimes today and can affect a company’s data and information. Some examples of computing devices that are used in crimes are smart phones, computers, digital video recorders, digital cameras, gaming systems that store data, digital music players and other electronic storage devices. Some of these devices can shutdown an operation to a business causing millions of dollars. An example would even be a DOS attack which could shutdown people from accessing your companies website. This means that wouldn’t be able to make purchases or check there

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    In this lab, you acted as a forensic specialist assisting the lead forensics investigator at the Cyber…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 349 Words
    • 1 Page

    A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase. The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. Forensic science has been increasingly used by the criminal justice system because of its growing accessibility. Technological advances over the last hundred years have made methods such as finger printing, blood and DNA analysis, and other forms of identification much easier for forensic scientists to perform, thus paving the way for the development of this field. Similarly, there has been an increased popularity for…

    • 625 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Computer forensics

    • 2184 Words
    • 8 Pages

    People who try to steal or seek other people 's personal information is growing rapidly in today 's society. Before we know it, a certain person may have access to your bank account ; before you know that your account is empty. You can access your e -mails ; before you know it your account will be hacked. Social networks to mobile phones ; People can even hide some things in images if they can certainly not be accessed. While we may delete files from our computer system, it does not leave your system immediately. Yes, it was removed but it is still floating around on your hard drive , making it easy for someone to easily recover the deleted file . This will include some different amount of information about how we can access hidden information , delete, copy information and hide some things in many ways . There will be discussions , explanations, tips, definitions and analytical critical information we need to know ; also accompanied by numerous screen shots of the work . Programs like Winhex , ProDiscover basic and SilentEye also play a monumental role in the report. Regarding the report , it will be in charge of anti- forensic techniques such as data hiding , wiping secure , encryption, file deletion, steganography and much more . After everything is done , then it will need a picture of the USB , so it can be further improved and used for activities and future tasks.…

    • 2184 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Computer Forensics

    • 857 Words
    • 4 Pages

    In this PBL 1 we learn about computer forensics lab and how do their handle a crime case. The uptake of technology has been just as widespread in the criminal world as everywhere else. This means that digital forensics is not just about “digital crime” such as hacking. Traditional crime can now be investigated by looking at its digital aspects, for example recreating the movements of a criminal’s mobile phone around a town or someone’s web-based research about the location of a burglary. The discipline of digital forensics involves the knowledge and skills necessary to investigate all types of cybercrime, including fraud, data theft, and identity theft and cyber terrorism. The role of the digital forensic investigator has emerged to investigate these and other crimes.…

    • 857 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Digital Evidence

    • 799 Words
    • 4 Pages

    This paper will help explain the basic understanding of computer forensics. I will also identify five areas in computers and computer application a forensic investigator can look for digital evidence. I will identify three types of criminal investigations that can utilize the services of computer forensic investigators. This paper will help with the understanding of computer forensics.…

    • 799 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    DIGITAL FORENSIC 2

    • 1390 Words
    • 9 Pages

    DIGITAL FORENSIC Dr. Rakish DIGITAL FORENSIC Digital Forensic Science (DFS): “The use of scientifically derived and proven methods toward the preservation, collection, validation, identification, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorized actions shown to be disruptive to planned operations.” Course Overview Digital forensics is a maturing scientific field with many sub-disciplines. Computer forensics • The goal of computer forensics is to explain the current state of a digital artifact; such as a computer system, storage medium or electronic document.…

    • 1390 Words
    • 9 Pages
    Satisfactory Essays
  • Better Essays

    Sextortion

    • 1706 Words
    • 7 Pages

    Press, E.C. (2010). Computer forensics investigating network intrusions and cybercrime:ec-council|press. Cilfton Park, NY: Course Technology Cengage Learning.…

    • 1706 Words
    • 7 Pages
    Better Essays