The processes and goals of cyber forensic investigations

Document Type:Essay

Subject Area:Computer Science

Document 1

Others in the past used ASCIL and IBM use EBCDIC in their mainframe system (Rouse, 2019). Transmitting information: When information is received into the system the computers must have a way of encoding the process by converting data into special formats and reversing the process. Encoding is the process of using various patterns by converting the data or a given sequence of character, symbols, alphabets etc. , into a specified format, for the secured transmission of data. The most common types of line encoding are Unipolar, Polar, Bipolar, and Manchester. • Reframe message: will allow the user to make another selection than the one that is present at the time. (Stay away). • Direction message: will coach the user to use a certain path that is acceptable in order to obtain ambition and success Message Transfer The plan address concerns of staff members, users and any other parties that are unsure of the plan to protect sensitive information.

Sign up to view the full document!

Please take a look at the diagram listed above and to get an idea how information will be managed (Silverstone, 2017). The Processes and Goals of Cyber Forensic Investigations 1. is tasked to secure its networks without doing any harm to the users. As a senior analyst, it has been possible to look at the current administration and how they have considered several steps that seek to improve the overall security of the nation and deal with cyber attackers in one way or the other (Von Solms, & Van Niekerk, 2013). This step has helped in transforming and ensuring that the right security channel has been maintained. As a cyber security Analyst of Username Technologies Limited, the study on cyber-attacks is very essential. The executive management being a key priority seeks to understand the various types of cyber-attacks and the threats thereof.

Sign up to view the full document!

Cyber defense majorly creates its focus on the prevention, detection, and the provision of a responsive and timely system to attacks and threats. Whenever the systems are tempered with; a clear response line is established, which helps in addressing the attack immediately. The scalability of attack alternatives is very high, considering the responsiveness of the system. The global cost of cybercrime is estimated to be approximately $600 billion, which is a great percentage of the global Gross Domestic Product (GDP). According to the CSIS report, the rate of cybercrime across the world has an ascending trend with a rate of growth from about $445 billion in the year 2014 to the current spend (Rid, & Buchanan, 2015). There are over 750,000 sexual predators online who seek to use others sexually.

Sign up to view the full document!

Even though they don’t want such to happen to them, they have ended up being used. This report has been proved from the information that has been sent to individuals without their consent (Bajcsy et al. After reporting such individuals to the system, nothing has been done to them; instead, the same individuals continue to thrive and exploit more people. As a security analyst, cyber exploitation should be addressed with immediate concern. Initially, there was no appropriate cyber law that could effectively vindicate the attackers. At the moment, cyber law has helped in reducing the crimes that are committed online. The attackers are aware of the consequences of their actions and can escape them by changing their ways. Further, the laws still need to be beefed up to make sure that the right principle considerations have been applied.

Sign up to view the full document!

Tasked as the principle Cyber Security Analyst at Username Technologies Limited, one major realization is the fact that the growth of technology and global cyberspace has impacted the world positively. How different online crimes are being done has opened a path to have a substantial digital path that would help to factor out the key issues that exist. Cybercriminals are continually committing computer crimes, which include more significant company policy violations, embezzlement, and email harassment. The move has prompted key policy regulators and network administrators to have computer forensic experts who can help in investigating the civil and criminal issues raised. This is a way through which different aspects of criminal problems are addressed. However, Username Technologies Limited is not neglected in considering forensic investigation as a critical priority towards online crime prevention (Brinson, Robinson, & Rogers, 2006).

Sign up to view the full document!

Whenever a specific type of criminal activity takes place, the most crucial consideration is to have a search warrant that will help in ensuring the right process have been completed in the right way (Adams, 1990). Through a search warrant, crucial evidence will be established in one way or the other. In fact, the different issues that have been reported will be understood through the use of an active search warrant (Brinson, Robinson, & Rogers, 2006). Forensic investigators can quickly obtain search warrants by convincing a neutral and detached law enforcer that indeed there is a probable cause to the belief that the criminal activity occurred at a place that needs to be investigated. This is in line with collecting more investigations of the evidence to support the crime.

Sign up to view the full document!

2 Chain of custody in a forensic investigation of computer-related crimes The chain of care in the digital forensic field is the chronological paper document containing the electronic evidence. After a search warrant has been completed in a particular place, the evidence will be documented in an electronic paper to be presented in court (Giova, 2011). The paper document is essential in ensuring that crucial evidence is never distorted but presented as it was obtained. The document usually presents the collection, sequence of control, transfer, and the analysis of significant evidence. Every individual who is responsible for handling crucial evidence is presented and perceived to have a subjective consideration in due course. With the constant increase in cyber concerns, there is a need to have forensic reliability that would make specific critical issues concerning forensic investigations have been considered.

Sign up to view the full document!

As a fundamental Cyber Security Analyst of Username Technologies limited, forensic investigation is the first principle framework to security essential online security. The management of passwords and the vindication of crime related activities within the organization should be the primary objective. Proper guidelines will be placed that will offer directions to the way in which different security concerns are considered. It is an excellent channel that will ensure the right principles have been completed and done in the right direction. It might also be part of the broader roles and institutional framework. Having a cybersecurity plan makes sure that the most appropriate channel has been used in a way that ensures effectiveness and right channel considerations. Different aspects should be done to make sure that a properly designed channel has been done in the right elements.

Sign up to view the full document!

The current technological changes, which are very high compared with the pace of organizations, has introduced the identification of the organizations business operation considerations. To be able to manage the anticipated risks completely, several security leaders ought to implement controls across ever-increasing network landscape. It should be remembered that having a reliable cybersecurity plan is a major component that should have the best possible approach to determination. With such considerations, there will be the effectiveness and right aspect considerations that will make sure the best possible channels have been considered. Threats are always available in one way or the other. Furthermore, some threats might manifest without the company expecting it (Ralston, Graham, & Hieb, 2007). The plan considered should all-time be able to contain any form of threat and consider right channels that will help them become more effective in the entire process.

Sign up to view the full document!

With midterm security goals, the organization will be able to align themselves with other external goals that will help in the effectiveness of the process (Miller, 1992). There should be right channel considerations that would ensure the right aspects have been completed and done in a way that is sustainable and effective in the correct way. The plan is usually developed with coordination with the security team to make sure that correct security details have been highlighted. It will subject the right ways and channels to the effectiveness that will help the process and ensure the right aspects have been done in the right way. The vision, goals, and the objectives of the plan should be reviewed at least annually by an executive cybersecurity review committee.

Sign up to view the full document!

Also, back then HIPPA violation did not exist until the late 90’s and your health information could be shared with just about anyone. In this paper, I would like to address security challenges focus on how important it is to have a well-established and a well security plan that views archiving procedures, a well balance communication process, and well written legal and regulatory supplies for all. As your new security advisor, I will monitor how information is given, received, and used. Encryption algorithms will be used to prevent malicious attacks or electronic eavesdropping from occurring (Fiedler, 2012). My main focus will be on communication, protecting important information, and dressing any security concerns. Create rules and regulation to follow 2. Create policies, that oversees disability 3.

Sign up to view the full document!

Establish telecommunication rules and regulation 4. Ensure critical communication infrastructure security 5. Learn about violation and how to avoid them. Understanding the scope of the organization will help in the alignment of the best security plan being considered. It is the best approach that makes sure the best channel is taken (Ralston, Graham, & Hieb, 2007). This is the best process that should be completed in any given period to make sure that the best method has been completed in the presented approach. The way such aspects are considered is a problem and should, therefore, have a suitable plan and process which can help in the realization of the objectives of the organization. There should always be an appropriate consideration that will enable the process to be useful no matter the issues that might be available at any given time period.

Sign up to view the full document!

It is one vital method to counteract the cybersecurity issues encountered. There are significant threats that the approach tries and contains to ensure right principle framework has been completed. The study looks at the security architecture considered and the plans that have been made to improve security. 1 Establishes a Security Awareness & Training Program The strategic security plan is seen to be a foundational document which provides a roadmap for the security department. It details how the corporate should enhance the strategic plan and achieve the desired security goals. Data is essential, and having the right authorization plan ensures that useful undertaking has been completed. This is one of the best possible proponents to make sure that the correct principle to boost the security system of the company has been achieved.

Sign up to view the full document!

The plan and effectiveness of the different aspects is the right approach towards the right considerations for better security. The plan identifies and defines key policy framework that is subject to the realization of the company. It details all the important components that the company considers to be essential. The procedures considered will also be tested to attain the best possible alternative solution. When the security plan is updated, any form of intrusion will be identified instantaneously. It will not be a complex process that can affect the way in which various channel considerations have been done. 4 Establishes a Disaster Recovery Program In one way or the other, security threat will occur and seems to be inevitable. The company considers drafting a reliable disaster recovery program that will help the organization towards the attainment of the right possible channel.

Sign up to view the full document!

The defense is an essential principle that helps to necessitate various issues and promote the best possible pathway towards the attainment of an effective aspect. There are a number of key issues that will generate a principal focus and identify defense to be one important project attainment consideration. In summary, having a strategy and plans for security architecture is essential. It is through effective security plan that various threats are countered. The existence of threats can be controlled through a well-defined security plan and architecture. The goal of developing a secure network design is to ensure there is consideration of effective security strategies that will help in the selection of the right techniques that will be responsible in the implementation of the different plans.

Sign up to view the full document!

It describes the various steps for the development of the security approach and covers fundamental security aspects which are essential in the organization (Ralston, Graham, & Hieb, 2007). Developing a policy to analyze network designs presents a modular approach that let the organization apply the layered solution to the system that will help them become more updated. It details the problems faced in the security system and ensures the right aspects have been considered in the right approach. This is a deterministic approach that will ensure proper details have been reported and problems solved in the given periods. It is through such that the company understands the way in which they ought to completely different components of security. Username Technologies Limited is in the topmost position to design resource management path for the satellite network and reach significant clients across the globe.

Sign up to view the full document!

With an intention to expand its market to other regions around the world, the organization seeks to have an ultimate channel consideration that will help them become more realistic in completing network sustainability. They have enacted key policy frameworks that will guide through the process and make sure that the right channels have been completed at any given time. It is through such undertaking that right aspects will be substantially completed in the given period. A public policy implementation process should be considered where realistic focus provision will be considered, and the services undertaken will be to promote public interest in the given process. There is a need to effectively come up with the right change policies that could be adopted in the security consideration through the company.

Sign up to view the full document!

It will give right aspects that could help the process to become effective and ensure the right aspects have been completed in the right ways. 0 Plan to Prepare Functions for Policy effectiveness Security is considered to be a complex platform that should be discussed with great concern. After having the right map for the stakeholders in the protection process, there is a necessity to look at the level of risk available and the possible strategies that can be applied. There ought to be a number of issues which were neglected in the security plan. The main objectives of having a security plan are to make sure that the level of threats expected is completely reduced. With such considerations, the security plan considered should be in a position to incorporate different aspects that are very important (Che, Duan, Zhang, & Fan, 2011).

Sign up to view the full document!

It will ensure that critical issues have been completed in the given period to make sure that various issues have been considered in the given process. it also helps in the reduction of the anticipated vulnerability among the systems of the organization. A. Anticipatory Search Warrants: Constitutionality, Requirements, and Scope. Ky. LJ, 79, 681. Anderson, E. & Levitt, K. Cyber defense technology networking and evaluation.  Communications of the ACM, 47(3), 58-61. Brancik, K.  Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks. Study on the security models and strategies of cloud computing.  Procedia Engineering, 23, 586-593. Eom, J. H. , Kim, N. Improving the chain of custody in the forensic investigation of electronic digital systems. International Journal of Computer Science and Network Security, 11(1), 1-9.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable