Project 1 – Investigation Considerations UMGC - CST 640 Overview ◦ Focus is on performing some of the steps for setting up an investigation ◦ Establishing the needs of the case ◦ Focusing...

1 answer below »
Please look over attachements.


Project 1 – Investigation Considerations UMGC - CST 640 Overview ◦ Focus is on performing some of the steps for setting up an investigation ◦ Establishing the needs of the case ◦ Focusing investigative efforts ◦ Determine what resources are needed ◦ Develop investigation plan Scenario: Digital Forensic Investigator working with Law Enforcement ◦ Two computers and a thumb drive are the evidence to be examined ◦ What are interview protocols and documentation needed for the investigation? ◦ What resources are needed? ◦ What will the plan for the investigation look like? ◦ What will be the plan submitted to your supervisor contain? 2 Step 1: Complete Preliminary Work Overview of laws governing: ◦ Chain of Custody ◦ Search Warrants ◦ Subpoenas ◦ Jurisdiction ◦ Forensic Laws and Regulations ◦ Review and Develop ◦ Police report and evidence ◦ Review requirements of a detailed investigation project plan ◦ Develop a series of questions to establish key people and activities ◦ Review industry compliance which may be applicable ◦ Deliverables of Step 1 – These will be included in your Investigation Project Plan! ◦ Create interview form to record questions, keywords and authorization information ◦ Designate the legal forms needed in the case 3 Step 2: Determine What Is Needed For The Investigation Consider the type of resources needed to conduct the investigation ◦ Establish Forensic Readiness ◦ Resources can include: ◦ People ◦ Tools ◦ Technologies ◦ RAID ◦ Disks ◦ Deployment Kits ◦ Imaging Programs ◦ Budget and Timeline Information Deliverables of Step 2 – These will be included in your final Investigation Project Plan! ◦ Checklist of resources required for the investigation 4 Step 3: Develop a Plan •Develop a plan for managing the investigation • Review reporting requirements, which reflect step-by-step rigidity of the investigation process • Identify: • Tasks to be performed • Sequence • Duration • Potential delays • Overall goals of the investigation • The goal is to articulate time, money and personnel requirements Project Plan Should Include: ◦ Sequenced evidence acquisition ◦ Investigation processes ◦ Time estimates ◦ Contingency Plans ◦ Communications and reporting ◦ What resources are involved ◦ How the activities will be carried out ◦ Frequency ◦ Circumstances 5 Step 4: Submit Completed Investigation Project Plan Combine the results of the previous three steps into a single planning document, known as the Investigation Project Plan. This should include: ◦ Title Page ◦ Table of contents ◦ Distinct section for each of the three steps ◦ Forms documenting key people, activities, timeline, keywords, authorization (ownership, jurisdiction) and designation of legal forms required for criminal investigations (Step 1) ◦ Resource List (Step 2) ◦ Management Plan (Step 3) ◦ Additional requirements for the deliverables ◦ All sources must be properly references, per APA guidelines 6 Competencies •1.1 Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment •2.2 Locate and access sufficient information to investigate the issue problem •4.1 Lead and/or participate in a diverse group to accomplish projects and assignments •5.1 Demonstrate best practices in organizing a digital forensic investigation •5.2 Utilize Project Management principles in an investigation 7 Questions 8 Please e-mail me or post in our Project 1 Discussion area! Thanks, Jay Guidelines for Investigation Project Plan Your report must be organized and written in a way that is easy to follow. Include all requirements that are identified in the Project 1 steps as well as here in the guidelines. Each section of the report should be clearly identified. Use the terms figure and table to refer to all images and graphics. Take time to check your sentence structure, expression of ideas, and spelling. Your writing must flow and make sense. Tables, screenshots, graphs, and artifact images contained in your report should be individually labeled and numbered using APA format (e.g., Table 1 Expense Budget, Figure 1 Screenshot of Washer ATM Image). Check UMGC library for the proper APA formatting. Your instructor may require additional details and different formatting approaches. Rely on your instructor’s guidance and feedback to produce the highest level of deliverables to meet or exceed performance standards for Project 1 in DFC 620/CST 640. Consider the following sections as the minimum starting point. Be sure to click each tab for more information. · Title Page · Table of Contents · Purpose · Meetings and Agendas · Required Forms · Checklist of Forensic Equipment and Software · Investigative Process · Inverview Forms with Questions · Investigation Timeline · Investigative Budget · Conclusions · References · Appendices In brief, this section should include what you as the investigator are trying to achieve through this investigation.  Note: You may want to include an abstract since you will be required to include an abstract in many of your future papers that you write in the UMGC graduate program. Your instructors will expect it and your paper submissions will stand out as polished graduate-level work. If you don’t know what an “abstract” is, review in the UMGC library or search online. This is the time to learn and grow.
Answered 7 days AfterJan 16, 2022

Answer To: Project 1 – Investigation Considerations UMGC - CST 640 Overview ◦ Focus is on performing some of...

Shubham answered on Jan 24 2022
122 Votes
Running Head: COMPUTER NETWORK SECURITY                    1
COMPUTER NETWORK SECURITY                            9
COMPUTER NETWORK SECURITY
THE INVESTIGATION PROJECT PLAN
Table of Contents
Abstract    3
Overview of the scenario    3
Evolution of Digital Forensic Investigation    3
Purpose    3
Governing Laws    4
Review of Industry compliance    6
Meetings and Agendas    6
Forensic Readiness    7
Resources 
    8
Investigative Process    11
Potential delays    13
Circumstances    15
References    19
Appendix    23
1. Investigation Checklist    23
3. Preliminary Investigation    25
4. Details of Investigation Team    25
5. Interview Questions for Investigation    26
Abstract
The report covers the various investigation tools, which were used for the purpose of the forensic investigation. They helped to retrieve information stored in computer and thumb drive and would help in further investigation process that need to be conduct by legal
authorities. It consists of various other documents like interview forms, checklist and budget estimates so that all relevant information is documented and handled. This will be helpful in estimating then resources required so that investigation can be completed effectively and efficiently. It will also be helpful in highlighting the activities that required to be reported and can be potentially researched.
Overview of the scenario
    Digital Forensic Investigator as per legal requirement will conduct investigation which will be involving examination of two computers and thumb drive as an evidence. In order to begin with the investigation it is required to chalk out the plan so that right direction can be followed. During investigation interviews will be conducted and response will be documented for which forms and checklist will be created. The resources like forensic investigation team, tools like software and technologies like RAID, disks, deployment kits and imaging programs will be collected. The investigation plan will consists of detailed description of the process which will be followed, requirements like governing laws which will be guiding force to maintain the reliability of the investigation will be mentioned. It will suggest ways by which analysis of the evidence will be done by the investigator. It will also include budgets, contingency plan, reporting guidelines and communications like meetings and their minutes.
Evolution of Digital Forensic Investigation
Purpose
The investigation plan will help to identify the objectives, procedures, processes and policies which will be guiding in measuring the alleged conduct. It will also include the key people who will be interviewed, investigation timeline and investigation budget and the allocation of resources along with calculation of the risks involved. According to Soltani and Seno (2019) the investigation undertaken will be detailed to create investigation plan regarding the raised concern. It will also be helpful in assisting the investigators to plan, record and navigate through the completion of the same. The investigation will be engaging and will direct the investigators to move in a relevant direction by avoiding the activities which are not useful.
Governing Laws
· Chain of Custody: This law will help in making evidence legally defensible. In order to do this three conditions need to be satisfied:
(i) The evidence should be properly identified by the collector
(ii) The collector should be neutral towards case and has no personal interest involved in the case (Joseph & Norman, 2019) and
(iii) The collectors has tampered the proofs and sealed the site from where the evidence were collected.
· Search Warrants: It is a permission given by law authorities which states that there is probable cause to believe that there can be evidence of crime in computer and thumb drive. It describes particularity of the things, which will be searched and seized by the digital forensic investigator (Amato, Cozzolino, Moscato & Moscato, 2019).
Devising a search strategy
A computer and its hard drive can be a source to different types of evidence. Before scripting a search strategy it is required to understand the possible roles of computer in the crime (Montasari, 2018):
Contraband: The computer is considered as contraband due to reasons like: it might be a repository of data or it is a stolen property.
Evidence of Crime: When it is a repository of data it might contains log books, spreadsheet detailing transactions which are suspicious, other documents etc.
Instrumentality of crime: The computer might have used for hacking, distributing videos, audios or other criminal activities.
· Subpoenas: They are referred as legal document which directs a person to attend the court and provide evidence as a witness. Before issuing subpoenas it is required to fulfill certain requirements which are listed by jurisdiction like valid legal cause and presence of evidence.
· Jurisdiction: It is referred to federal and state jurisdiction under which the crime is reported and will be discussed.
· Forensic Laws and Regulations
The three aspects of law which need to be taken care of, to ensure computer security are:
(i) The Fourth Amendment in United States Constitution
which provides protection against unreasonable search and seizure and the Fifth Amendment against self-incrimination (Kao, Wu & Tsai, 2019).
(ii) The awareness about three US statutory laws:
· Wiretap Act (18 U.S.C. 2510-22)
· Pen Registers and Trap and Trace Devices Statute (18 U.S.C. 3121-27)
· Stored Wired and Electronic Communication Act (18 U.S.C. 2701-120)
This laws cannot be violated during computer forensics as it will attract punishable penalty.
(iii) The last but not least says that evidence should be authentic, reliable and can be treated as evidence. Apart from this there are two laws which affects the Forensic laws namely: Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley, California Act 1798.
Review of Industry compliance
As per Raychaudhuri (2019) the industry standards guide the forensic team that they should include memebrs from all speheres of corportae world who have varied expereinces. It will be helpful in combating the investigation challneges at forensic site. The strict guodelines need to be followed loke chain of custody, managing issues of jurisdictional access and data transport.
The monitoring devices should be independent and free from any kind of biasness so that all statutory complainces are fulfilled with diligence. The team should have substantial experience in managing cases, monitoring capacity of every size form government to private, from contractual to temporary etc. There are several other concerns like corruption, bribery, favouritism should be detected and prevented at due course of time so that outcome of the investigation is free and fair. It should be helpful to the company and the stakeholders so that necessary assistance can be provided to them by designing security policies and consulting them on the same.
Meetings and Agendas
Initial Meeting
The organizational framework will be studied. It will be found out how many employees are working, who all have access to computer and they will be asked questions on individual basis along with IT department. The questionnaire is attached in Appendix 5 for the reference. the acquired information will be summarized and documented so that further investigations can be planned on its behalf.
At team level
Before beginning with the initial meeting with the organization them team will meet and brief about the new project. They will discuss about the organization , the problem which is at surface and discuss the questions which will help them to move forward with the preliminary investigation.
Second Meeting
The second meeting will be conducted to gather more in depth information about the evidences and the suspects. It will help in analysing the usage patterns and verbal explanation of employees at the crime site. The available evidence two computer and the thumb drive will be taken into custody by showing search warrants. The key personnels will be interviewed to get more information and he same questionnaire will be used again as mentioned in Appendix 5.
At team Level
    The team will review the progress under the guidance of the Senior and examine the evidences as per checklist and the mentioned tools. It will also start examining the policies framed by the organization so to find the loops available for the breach.
Forensic Readiness
The aim of forensic readiness is to create incident preparedness which includes actions which are technical and non-technical in nature (Munkhondya, Ikuesan & Venter, 2019). The ten-step process of achieving forensic readiness is:
1. The business scenarios should be defined so that digital eveidence can be created a sper their requirement.
2. The...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here