7077515

Download This Paper

Part I actually. The availability with the personal computer or perhaps PC at every home and every office personal pc, and the daybreak of the Internet brought to emphasis not only the advantages derived from these kinds of technologies but abuse and also to a greater level, crimes too. Suddenly, cybercrime is at the increase and methods of finding and making these criminal hackers pay out became a forefront competence in i . t and law enforcement officials.

One of the best deterrents to computer system crime is to catch individuals who commit the dastardly functions (Solomon & Prosise, 2001)!

Of all the types of felony hackers, the worse is a “insider” , a current employee or a former “disgruntled employee” , since they are or had been in a “trust relationship” with the employer, and so they demeaned that trust by attacking the knowledge systems in the company. When this type of criminal offense, or cybercrime, occurs, the recourse should be to call in pc forensics and incident response professionals to remedy the situation. Solomon et ing. (2005) identifies computer forensics as, “Computer investigation and analysis tactics that entail the recognition, preservation, removal, documentation, and interpretation of computer data to determine potential legal evidence. “

Once there is a probable determination that a cybercrime was committed, the computer forensics and incident response experts stick to well-choreograph technique to efficiently document evidence and prosecute a cybercrime. Robbins (2002) lists throughout the basic but critical methods to pc forensics:

1 . Protect the subject computer system through the forensic exam from any kind of possible change, damage, data corruption, or virus intro

2 . Discover all files on the subject system including existing normal data files, deleted however remaining data, hidden data files, password-protected data, and protected files

a few. Recover as far as possible all of discovered deleted documents

4. Reveal to the level possible the contents of hidden files as well as non permanent or exchange files utilized by both the application programs as well as the operating system

a few. Access, if at all possible and if lawfully appropriate, the contents of protected or perhaps encrypted data

6. Evaluate all probably relevant data found in unique and typically inaccessible aspects of a hard drive including however, not limited to the , unallocated’ space over a disk, as well as , slack’ space in a file

7. Print a general analysis from the subject personal computer, including report on all possibly relevant documents and uncovered file data, then provide an opinion of the system layout, the file constructions discovered, any kind of discovered data and authorship information, virtually any attempts to hide, delete, shield, encrypt details, and everything else that has been discovered and seems to be relevant to the complete computer system examination, and

8. Provide expert consultation and/or testimony, while required.

While the experts performing the research, it is important to liaise and coordinate, based upon the legal parameters in the crime, with local or perhaps federal cybercrime units. In some states inside the U. S i9000., it is a federal government crime to not report laptop crimes and soon, confirming of cybercrimes will be federally mandated. However the key point in cybercrime research is making sure the evidence gathered will endure legal scrutiny.

Part II. A common account heard about cybercrimes is the make use of “social executive techniques. inch Social executive basically plays the “con man” to elicit details from naive or unknowing victims. A Help Table employee for example can contact a admin and ask on her password as he requirements it to diagnose her PC remotely. Since there is a “trust relationship” already, the secretary provides her COMPUTER password. The assistance Desk worker then seen the secretary’s PC and downloaded private memos and reports. Then he sells these types of documents to competitors as well as the competitors ended up being gaining edge on the Support Desk employee’s company mainly because they already have insider information.

A case like this might have been prevented in the event the company, or even any authorities agency, experienced good reliability policies in position. Part of the reliability policies could have been consumer education teaching and if the user’s have been properly educated, they would have got known that nobody should know their very own passwords nevertheless themselves. In securing the information systems, the baseline or starting point is having good protection policies in place and these types of policies will need to and has to be based on worldwide accepted criteria and sector best practices. The ISO 17799 or Code of Practice for Information Protection Management (ISO/IEC, 2005) is actually one of the best standards to adapt whether small , medium or perhaps large companies , possibly government agencies for example!

Shaurette (2002) stated that, “Information reliability is not just regarding technological handles. Security cannot be achieved solely through the application of software or perhaps hardware. Virtually any attempt to apply technology settings without considering the cultural and social thinking of the organization is a solution for tragedy. ” Once this has been considered into head, mitigation of risks to the information systems will be achieved and avoidance of cybercrimes, whether coming from malicious insiders or external criminal hackers, will be reinforced.

Need writing help?

We can write an essay on your own custom topics!