CSS350 IP5 Essay

6839 Words Jan 24th, 2015 28 Pages
CSS350-1301A-01 Computer Forensics 1
Key Assignment
David Laurin Jr.
February 11, 2013

Table of contents
Table of contents 2
Introduction to computer forensics 3
Computer forensics defined 3
Situations that might lead to the need for an investigation 4
Digital investigation processes and procedures 7
Collecting and preserving data 11
Investigation methodology and data analysis 16
Reporting the case 29
References 37

Introduction to computer forensics
Computer forensics defined In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can
…show more content…
Computer forensics investigation revealed that this Trojan was downloaded by an employee who opened an email attachment from an untrusted source. The Trojan’s payload was a virus that allowed the attacker to execute malicious code and take down the network. The incident response team was able to isolate the virus and get the network running but the organization lost two days of productivity and about two hundred thousand dollars in lost revenues.
The fifth scenario involves electronic discovery. The organization terminated an employee who was accused of company misconduct. He decides to file a lawsuit for wrongful termination because he believes that he was set-up by other employees in the organization. His lawyer requests all records pertaining to his case including electronic documents, emails to and from at least five other employees who may have been discussing his case, and disciplinary records.
Computer forensics is needed to research and produce these documents to satisfy the needs of evidence in a civil court proceeding. The evidence obtained should be preserved and unedited whether it benefits the company or not. “In system forensics, as in any other branch of forensic science, the emphasis must be on the integrity and security of evidence,” (Vacca and Rudolph, 2011, p. 5).
Digital investigation processes and procedures When participating in a

Related Documents