Digita Insider File Deletion Case Study

Superior Essays
Information technology has revolutionized virtually all aspects of human life. From communication to entertainment, all human endeavors have been affected by information technology. Whereas the benefits of information technology must be recognized, it is important to mention the challenges that it presents. Individuals and organizations rely on information technology for such issues as communication. Despite instituting measures to ensure data security, breaches usually occur. Left unaddressed, these breaches could devastate any organization. For instance, Yahoo recently reported that a security breach had allowed hackers to obtain the personal details of millions of users (Moritz & Womack, 2016). Investor panic was the result of this breach. The case of Yahoo underscores the need for organizations to dedicate all their efforts to securing their systems. Digital forensics investigation is one of the tools available to individuals and organizations which desire to secure their systems. Basically, digital forensics investigation involves examining …show more content…
Insider file deletion is a threat to cyber security since it is carried out by trusted people who understand the vulnerabilities of systems (Chan et al., 2012). The key to tackling this deletion is tracing it back to the perpetrator. It is advised that system administrators should move with speed to identify those responsible for the deletion (Chan et al., 2012). Social media data could provide insights which can be used to identify the responsible party. Suppose that the perpetrator used credentials that can be linked to their social media account. An investigator can exploit this link to identify the perpetrator. Investigators can also rely on network logs to identify incidences of insider file deletion. These logs serve as records of activities carried out on a

Related Documents

  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The book Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis has often given me the impression that this book was intended to warn its audience of the many dangers of technology, and that the benefits of using technology are not worth the risks. The book’s third chapter, “Ghosts in the Machine,” however, was different, because I noticed that the authors were just giving information about things that computers do that people may not realize, but not necessarily implying that all of these abilities are dangerous or harmful. For this reason, and for many other reasons, I enjoyed reading this chapter of Blown to Bits more than I have enjoyed reading any other chapter so far. The first topic discussed in this chapter left me with feelings of both concern and relief.…

    • 871 Words
    • 4 Pages
    Great Essays
  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Opm Hack

    • 896 Words
    • 4 Pages

    Larger organizations are prone to attacks similar to the OPM hack due to its size and anomalies in the system. Hackers often monitor online and system activity that can be identified through operational patterns. Human behavior played a major role in a systematic approach that hackers used to detect…

    • 896 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Computer Forensic Analysis

    • 1326 Words
    • 6 Pages

    Every company today has security vulnerabilities and threats from many angles. Individuals will attempt to take advantage of these vulnerabilities to reach their goal. Others will think what they are doing is a joke or legal or worse yet believe they will not get caught. Some are easy to detect, others are not and require prioritization to handle the data from its original location, create an analysis plan, gather the evidence, and create the evidence reports which must comply with all the laws that affect digital forensics. The increase in connectivity means an increase in the difficulty to gather and secure information to maintain threats to a minimum due to the amount of knowledge that those breaking the law can acquire to attempt to deter the efforts of those trying to piece together the puzzle the wrong doers left behind.…

    • 1326 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Digital Forensics

    • 988 Words
    • 4 Pages

    With that being said, the purpose of writing this document will aide in helping to train patrol officers in how to do a complete analysis when collecting and analyzing digital evidence. The document that I have written for the training division includes the following types of computer forensic concepts which are write blocking, bit-by-bit or bitstream copying, hashing or hash valves, forensic analysis, indexing process and the recovering of deleted and encrypted files. These concepts are performed once all the material has been collected, documented, photographed, labeled and…

    • 988 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Computer Forensics

    • 327 Words
    • 2 Pages

    Computer forensics plays a vital role in recovering and revealing the hidden clues. A very famous case is the BTK Killer where investigators had assisted the police to discover a serial killer, Dennis Rader, through a floppy disk that Dennis sent to the police. Investigators found within the documents implicated an author name "Dennis" at "Christ Lutheran Church". This evidence helped to lead to the serial killer's arrest. Sound like watching CSI?…

    • 327 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    As an expert in identity theft, the author exposes a business owner’s case in which the business’ computer system is compromised.…

    • 170 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Tom goes as far as to say, “malicious employees have been fleecing their employers for years” (2009). No doubt pointing towards the former employee of DuPont that managed to steal $400 million dollars’ worth of files from the company. Tom also went on to say, “Employees can commit cybercrimes such as fraud, identity theft and theft of intellectual property much faster and easier than un-trusted outsiders” (2009). By monitoring the network, the worry of complete data loss is expunged. The monitoring systems log every bit of data on the network for records.…

    • 524 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Malicious insiders are posturing exceptional security difficulties to organizations because of their insight, abilities, and authorized access to data frameworks. The scopes of potential digital evidence supports have grown exponentially, be it hard drives in personal computers and laptops or solid state memories in mobile devices such as smartphones and tablets, even while idleness times linger behind. This paper discusses four best sources of data that forensics experts hunger to get their hands on. They are log files, hard drives, mobiles devices, and social networking websites. Each of these sources has its own characteristics and techniques that the forensic investigators can use to explore hidden evidence.…

    • 1684 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    INTRODUCTION Today with fast growing digital age of modern technology, digital forensic experts are facing a number of data sources that they need and rely on to acquire valuable information for their investigations. Data sources can come from different forms and areas such as: personal computer, hard drives, network logs, social networking sites, mobile devices. These sources can contain a vast amount of data.…

    • 1851 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Technology And Crime

    • 836 Words
    • 4 Pages

    More and more online crimes are being committed on a regular basis. There are millions of hackers who are hacking into computers and accessing people’s personal information. One of the most common internet crime is hacking, which is considered a felony. Each day, new ways of accessing and manipulating specific information and data are discovered. When someone is being hacked, the owner of the computer is unaware that someone has this access to their sensitive information.…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Crime Causation Theory

    • 1752 Words
    • 8 Pages

    Some of these challenges outlined are key issues that make it tough to predict or detect cybercrimes, for instance finding out the identity of the hackers or hacker groups behind an attack is a problem, due to the mask of anonymity that conceals individuals true identities. Another factor is the idea that the perpetrator behind a computer crime can originate from around the world, thus the restrictive boundaries of space geographically and politically making it time and resource consuming for law enforcements to pursue any relevant leads or evidence. Also due to the ever increasing interconnection of various public and private companies’ reliance on their own privacy and interdependence, the sharing of information has made it challenging to track or locate individuals behind these cybercrimes who at times use similar tools developed for reliability for criminal purposes, therefore making it costly and difficult to deter such threats (Deloitte, 2008). One such initiative that was introduced was the Canada Evidence Act that provided new powers that gave police the ability to search and seize warrants that would ensure private internet providers and telecommunication firms reveal information as it relates to…

    • 1752 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Ease of data management is one of the biggest advantages to any business in the world since the technology boom. A Security breach occurs when hackers illegally gain access to the private and confidential database of companies. It is the intrusion by hackers into the network of a computer or the network of multiple of multiple computers in order to steal or destroy confidential company information. In most cases this information is the personal information of the company’s customers and other users. Personal information such as credit card number, social security number, date of birth, contact information, etc. are stolen or destroyed by hackers.…

    • 1240 Words
    • 5 Pages
    Improved Essays