Verified Document

Search Warrant And Database Research Paper

Digital Forensics and Cyber Crime Investigation HCC Partner is the top healthcare company in the United States, and the management has noticed an intrusion in the systems based on the alerts from their IDS (Intrusion Detection System) logs that causes the management to question the reliability of the system. Analysis of their systems reveals that HCC uses the Snort IDS that is running in Linux system. Moreover, the HCC database administrator has received and downloaded the strange email from the Human Resources Department, which makes the system behaving strangely after they open the attachment.

The objective of this project is to analyze the HCC database server, the network system and other workstations suspected leading to data leakage. The project will investigate whether there is a possibility of evidence of data breach.

A: Plan for Processing the Incident Scene and Potential Crime

The study uses the staircase model for the investigation processing because the model assists in enhancing a practical method for forensic investigation....

Method to Identify Potential Digital Evidence
The first strategy to identify the potential evidence is to trace the source of email attachment from the human resource department. Essentially, all the emails communication and attachment will be stored in the database server. The next step is to the check the hard disk of the human resources computer to verify whether the email is sent from the HR department. The method to verify whether the email comes HR department is to search the company database server for all the emails sent to the database administrator the day the email is received. While email searching carried out manually can be time-consuming, however, we suggest using the X-Ways Forensics software for the automatic searching for the email.

If the email in the hard disk r database is deleted, the next process is to use the forensic software to recover the email deleted on this data. The study suggests using the Encase software to assist in retrieving the deleted emails. The tool has the ability to collect data from various devices, and assist in unearthing the evidence. If the file is sent from HR department, the next step is to scan the file to detect the presence of malicious software. The study suggests using one of the premium antivirus software to identify whether the file contains the malware and if the…

Sources used in this document:
The next step is to develop a documentation of the evidence. The study suggests using the digital camera take the photos of all the evidence. The photo must ensure 360-degree coverage of the scene. The photo must reveal the location of all the seized computer systems. The front, back, and, side by all photos must photograph. However, there is a need for a videotaping of the active screen monitor. The photographs should reveal the position of mice, computer components, cables and other evidence.

Reference

Casey, E. (2011). Digital evidence and computer crime: forensic science, computers and the Internet. Waltham: Academic Press.
Cite this Document:
Copy Bibliography Citation

Related Documents

Nurse Satisfaction in Magnet Hospitals Which Three
Words: 572 Length: 2 Document Type: Essay

Nurse Satisfaction in Magnet Hospitals Which three databases will you use? CINAHL Academic Search Nursing & Allied Health Collection Search each database, using key words, for relevant research on this subject. What key words did you use in the Search Strategy fields? Include all attempts and limitations used to refine your search. Magnet hospital Nurse + contentment Nurses + satisfaction Report the number of citations identified from each database in the number of articles found field. ,200; 15,01; 15,991 ,000; 29,000;

Welcome to Homicide Case "Welcome to Homicide"
Words: 2613 Length: 8 Document Type: Essay

Welcome to Homicide Case "Welcome to Homicide" "There's a theory that every time you leave an area, you always leave evidence behind, no matter what, no matter how careful you are; and that's why there's forensics" (Santy, 2007). Forensic science has seen a number of major developments over the years. Throughout its evolution, analytic techniques have become finer tuned and accurate, allowing for much greater law enforcement practices. Today, forensics relies

Comprehensive Study of Cryptographic Methods in Practice Today
Words: 4113 Length: 15 Document Type: Term Paper

Internet Encryption The growing sophistication of internet, along with advancing abilities of individuals to hack into electronic systems is creating a growing need for improved encryption technology. The internet is becoming a domain all to itself, with its own rules, and requirements. The internet is creating new opportunities for the business and communication industries. It is also creating new demands. The internet is now facing a period in its evolution similar

Patriot Act and 911 Commission Exclusionary Rule and Miranda V. Arizona...
Words: 4312 Length: 9 Document Type: Term Paper

Corruption exists within all aspects of government, and has since early civilization. While many steps have been taken to prevent such corruption in other areas of the world, the United States has recently introduced legislation that has the potential to actually increase the amount of possible corruption, particularly in reference to police officers "enforcing" the law. This paper will discuss the U.S.A. Patriot Act and its follow-up legislation, the Domestic

Pre-Sentence Investigation Defense Attorney Jim Aiken Narcotics
Words: 2924 Length: 9 Document Type: Chapter

Pre-Sentence Investigation Defense Attorney Jim Aiken Narcotics Detective Homicide Detective Miranda The Miranda rights were formulated in 1966 by the U.S. Supreme court after a case between Miranda v. Arizona. The Miranda rights relate to the frights of an individual when that person is being taken into custody by the police and before that individual is being questioned. The individual should be read out and told about his rights according to the Fifth Amendment so that

History of the Exclusionary Rule and Should It Be Continued
Words: 3153 Length: 10 Document Type: Term Paper

Exclusionary Rule The Future of the Exclusionary Rule The first 10 amendments to the U.S. Constitution, otherwise known as the Bill of Rights, were designed to protect citizens against abusive state power. These protections include preventing the government from entering and seizing property without just cause or stripping citizens of their rights without due process (Oaks 665). These protections are encoded within the Fourth, Fifth, Sixth, and Fourteenth Amendments to the U.S.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now