Digita Insider File Deletion Case Study

Superior Essays
Information technology has revolutionized virtually all aspects of human life. From communication to entertainment, all human endeavors have been affected by information technology. Whereas the benefits of information technology must be recognized, it is important to mention the challenges that it presents. Individuals and organizations rely on information technology for such issues as communication. Despite instituting measures to ensure data security, breaches usually occur. Left unaddressed, these breaches could devastate any organization. For instance, Yahoo recently reported that a security breach had allowed hackers to obtain the personal details of millions of users (Moritz & Womack, 2016). Investor panic was the result of this breach. The case of Yahoo underscores the need for organizations to dedicate all their efforts to securing their systems. Digital forensics investigation is one of the tools available to individuals and organizations which desire to secure their systems. Basically, digital forensics investigation involves examining …show more content…
Insider file deletion is a threat to cyber security since it is carried out by trusted people who understand the vulnerabilities of systems (Chan et al., 2012). The key to tackling this deletion is tracing it back to the perpetrator. It is advised that system administrators should move with speed to identify those responsible for the deletion (Chan et al., 2012). Social media data could provide insights which can be used to identify the responsible party. Suppose that the perpetrator used credentials that can be linked to their social media account. An investigator can exploit this link to identify the perpetrator. Investigators can also rely on network logs to identify incidences of insider file deletion. These logs serve as records of activities carried out on a

Related Documents

  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    The information security program can use tools to track any changes to any important data, also it can show when the file was last…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The book Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis has often given me the impression that this book was intended to warn its audience of the many dangers of technology, and that the benefits of using technology are not worth the risks. The book’s third chapter, “Ghosts in the Machine,” however, was different, because I noticed that the authors were just giving information about things that computers do that people may not realize, but not necessarily implying that all of these abilities are dangerous or harmful. For this reason, and for many other reasons, I enjoyed reading this chapter of Blown to Bits more than I have enjoyed reading any other chapter so far. The first topic discussed in this chapter left me with feelings of both concern and relief.…

    • 871 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The use of forensics in criminal investigations is to establish possible guilt or innocence of the potential suspect, linking crime between the suspect…

    • 1469 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Computer forensics is the preservation, acquisition, extraction, analysis, and interpretation of computer data. The ultimate goal of computer forensics is to identify, collect, preserve, and analyze the data that has been collected to use in a legal case. A lot of devices are capable of storing…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Computer Forensics

    • 327 Words
    • 2 Pages

    There's always a chance that employees will disclose corporate data without authorisation to third parties or competitors. The chance increases when employees are unhappy, dissatisfied, or being fired. As corporate information such as business plans, customers database and product roadmaps are private and confidential, a computer forensics is needed to assist in protecting and lock down the potential leak of sensitive data. If such incident happens, he will help to uncover the person responsible.…

    • 327 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Mr. Oliver sent the three photos to a single person whom he deems trustworthy enough to not exploit the photos. Task 2) Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law…

    • 711 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    One of the few saving graces was the IT manager’s awareness of the great need for standardizing backup procedures and related disaster recovery capabilities (Whitman & Mattord, 2011). This allowed the IT department to have the ability to recover almost everything that had been deleted or changed very quickly. The second saving grace was the firewalls between the different networks had prevented the attacker from connecting and causing further damage after being fired (Whitman & Mattord, 2011). Lastly, even if the IT manager was fairly new to this company, in two years it would seem he should he should have noted that employees were using the shared archaic, still-active accounts (Whitman & Mattord, 2011).…

    • 884 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    These sources can contain a vast amount of data. Hence, they lead to many challenges in acquiring the evidence. For example, just in a mobile devices category, there are multiple types of devices – cell phones, smartphones, tablets, Personal Digital Assistant (PDA) devices, and etcetera. In helping the investigators to organize their sources, there are three different events – network intrusion, malware installation, and insider file deletion – can be used to prioritize data sources’ potential usefulness. This paper will discuss 4 major sources of data: log files, hard drives, mobile devices, and social networking websites.…

    • 1684 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Crime Causation Theory

    • 1752 Words
    • 8 Pages

    Some of these challenges outlined are key issues that make it tough to predict or detect cybercrimes, for instance finding out the identity of the hackers or hacker groups behind an attack is a problem, due to the mask of anonymity that conceals individuals true identities. Another factor is the idea that the perpetrator behind a computer crime can originate from around the world, thus the restrictive boundaries of space geographically and politically making it time and resource consuming for law enforcements to pursue any relevant leads or evidence. Also due to the ever increasing interconnection of various public and private companies’ reliance on their own privacy and interdependence, the sharing of information has made it challenging to track or locate individuals behind these cybercrimes who at times use similar tools developed for reliability for criminal purposes, therefore making it costly and difficult to deter such threats (Deloitte, 2008). One such initiative that was introduced was the Canada Evidence Act that provided new powers that gave police the ability to search and seize warrants that would ensure private internet providers and telecommunication firms reveal information as it relates to…

    • 1752 Words
    • 8 Pages
    Great Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays