UCLAN High Tech Crime Unit was a company that serves in digital forensic area. I am the employer of that company. I am working as a digital forensic investigator. One day I will get a call from MD (Managing Director) of a famous company named as Vamos Solutions.
In this company every day a crew they check each and every employee of the company Vamos Solutions to prevent any data theft. As usual one day they checked one of his employee. During the checking he have a USB flash stick in his hand. So security officials’ suspect that the employee steal something from the office computer. So they informed that to his MD (Managing Director). So he called me to investigate that case. And he gives a USB memory stick image file for the investigation. And he said me to find if any data theft was traced, if any submit the evidence to him.
Intention
The main intention of this investigation is to investigate image file (USB image file) given to the investigation. That is belongs to the employee of the company.
Purpose
Main objectives,
Digital forensics was a process of investing the cybercrimes. (InfoSec Resources, 2018) For that kind of investigation there are lots and lots of methods and tools are available. (Casey, 2007) As a digital forensic investigator we have to choose any one of the method. (Dudley-Gough, 2006) Available digital forensic tools are,
Regripper was a widely used digital forensic application to carry out a digital forensic investigation. Carlon carvey was the creator of the software. (InfoSec Resources, 2018) The main purpose of the software is to extract a data from register of the PC (Personnel Computer). That is created to reduce the complication and timing of the extraction of computer register. That software reduce the time to extract the register details from 10 hrs. To some minutes. The software was created for the less skilled investigator. So it was in very simple form. This software allows to add a plugin Auditpol (Audit Policy). That is used to find if user changes his audit policies. This software also has a potential to convert raw image data extracted from the computer register to readable format. Due this features this product was widely used by the digital forensic investigators.
In market there is another software tools was used for the same purpose. But it has more advantage than the above tool. (Sleuthkit.org, 2018) It has a fantastic graphical user interface. This software has a high level performance also. So it is also widely used. (Altheide and Harlan Carvey, 2011) That software was created by the company named Basic Technology Corporation. They made tutorials for this software and it was accessed from their (Basic Technology Corporation) company website. The software has the following advantages,
Here we have to obey to the set of ten instructions to investigate the digital Forensic case by this method. (Jahankhani, 2010)
Step 1: Start
It is an online based digital Forensic investigation tool. At first we need to start this digital Forensic investigation software works on windows OS and Linus OS.
Step 2: Open Newcase
In this digital Forensic software application we simply press the newcase icon which starts the new investigation dialogue box.
Step 3: Data entering
This digital Forensic investigation tool we must enter the information required by create dialogue box named as newcase.
Step 4: Selecting an image file
After completing the data entering, the evidence directory selection dialogue box will open. In this dialogue box we are advised to select the address of the evidence (USB data in image format).
Step 5: Adding name to the host
After that add host dialogue box will be opened. In this dialogue box you must need to type the host name and its details.
Step 6: Identification location of host
After that you click the add image button to insert a forensic data (disk file in image format).
Step 7: New disk image addition
Now we can able to see the dialogue box on the screen in this dialogue box you are advised to press the add image icon to open a new image file in the Autopsy digital Forensic software tool.
Step 8: Selecting the image file location
This is an option helps to make a duplicate copy of the image file. Because working with original file has some deficiencies. When working with duplicate there is no problem.
Step 9: Investigation gallery
This is one of the advanced feature in this Autopsy forensic investigation tool which is used for adding a host.
Step 10: Other features
In this stage you can see the different options on the screen, the different options are very very useful on the investigation of the case.
Forensic Tool Kit was an abbreviation FTK. It is a mostly used digital Forensic software application for the purpose of examining and collecting the evidences of the digital forensics. (AccessData, 2018) Which is created by Access Data Corporation. They sells the various software tools for forensic investigation. It was helped to scan digital forensic data. This digital Forensic software tool kit was also helps to create disk image this function was called as FTK imager. This digital Forensic software application which gives flexibility in examination. Here we would see about some of the digital Forensic image formats for various disk image file can be analyzed by Accessdata Forensic Tool Kit digital Forensic software tool are as listed below,
Accessdata Forensic Tool Kit was most commonly used DF software tool among other digital forensic investigating tool kit, because of its easy working instructions. And various stages involved in the investigation of DF analysis of the digital forensic image.
Step 1: Evidence file adding
Here first choose the evidence type among the available four types of evidence type that is given to analyze. After that we need to choose the directory.
Step 2: Evidence tree
The tree structured arrangement of evidences was a tree developed by the digital forensic tool to analyze the various files and folders are there in the image file to be given.
Step 3: Virtual disk mounting
In this digital forensic software we have option to mount a analyzed data as a virtual disk (Read only Purpose).
Forensics was a science of investigating the things and collecting the evidence. (Carvey, n.d.) Here digital forensics means the process of investigating the digital data stored on the digital storage devices like USB flash stick, computer hard disk, and online based cloud storage. The digital forensics also termed as the computer forensics. That is carried out to investigate the cybercrimes and collect the evidences against the cybercriminal.
Digital forensic investigation has a huge variety of applications like ensure the security of the confidential data. Here the evidences are retrieved from the computers, external storage devices, online cloud storages etc… this also carried out by the private sectors. Because the no of users of the computer and internet was increased day to day. Growth of the computer technologies are also favorable for the cyber criminals.
In digital forensic investigation we need collect the evidences against the criminals by inspecting the computer f the criminals. Then we have to convert the details into the readable format. Then we have to create a report that must be understandable by the non-technical audience. This is the standard procedure followed by all the digital forensic investigators. All the details are collected must be stored as duplicate file because working with the original file was not too good there is a possibility of loose the data contains the important evidences. Digital forensic investigation also used to make the security system more strong. That ensures that the same error won’t happen again.
In this case we got a USB flash stick image file for a digital forensic investigation. This USB flash stick belongs to the employee of the Vamos Solutions. In this case we examine the USB flash stick by use of DF software tool named as Accessdata Forensic Tool Kit. And investigation reports are obtained from the pen drive data in image format was showed below.
Based on our inspection that is clear it has a 7963 mega bite memory capacity. There are four folders are there in this USB stick, as well as one excel file named as “income.xlsx”. First folder was a empty folder. Other three folders contains a many sub folders within that. May be suspect trying to hide something from the security check up.
1.Is there any evidence to suggest that the company secrets have been copied onto the USB pen?
Yes the USB flash stick has an evidence for making the copy of the sensitive data of the company. That was a excel file named as income.xlsx. That is retrieved during the investigation of a USB flash stick. The screen shot of the investigation detail was showed below.
That is the screenshot of the file properties.
2.Is there any evidence to suggest that the suspect has tried to hide any data?
The question was any evidence are there against the suspect for trying to hide something. Our investigation results state that the USB flash stick contains too many sub folders, may be they created for escaping from the security checkup.
Screenshot of the investigation result that shows too dummy folders.
Investigation results gives the strong evidence against the employee. That is the creation of dummy folders with same names. That is done by the employee because he wants to hide something from
3.Any evidence to suggest the reason why the suspect has attempted to steal this data?
the onsite security officials. The screen shot of the dummy folder tree was showed in the above figure.
4.What further evidence may be needed by the investigation team to support any of the facts discovered during your investigation?
For the further investigation we requires the following details from the company.
Conclusion
Investigation reports regards to the case of Vamos Solutions state that the employee copied the file from the office computer which has the sensitive details about the company. The data stealing of the employee was confirmed. In this investigation we investigate the USB flash stick image file of the suspect. On this investigation we found the excel file named as “income.xlsx”. Maybe this a file copied from the offices computer. The suspect created a too many sub folders on the same name (f1, f2, f3, and f4). Those are created to hide something (it may be the sensitive data of the company) from the security checkup carried out by the office security officers.
References
AccessData. (2018). Forensic Toolkit. [online] Available at: https://accessdata.com/products-services/forensic-toolkit-ftk [Accessed 8 May 2018].
Altheide, C. and Harlan Carvey (2011). Digital Forensics with Open Source Tools. Elsevier Science.
Carvey, H. (2018). Using RegRipper. [online] Windowsir.blogspot.in. Available at: https://windowsir.blogspot.in/2011/04/using-regripper.html [Accessed 8 May 2018].
Carvey, H. (n.d.). Windows registry forensics.
Casey, E. (2007). Handbook of computer crime investigation. Amstersdam: Academic.
Dudley-Gough, N. (2006). Digital Forensic Certification Board. Digital Investigation, 3(1), pp.7-8.
InfoSec Resources. (2018). 7 Best Computer Forensics Tools. [online] Available at: https://resources.infosecinstitute.com/7-best-computer-forensics-tools/#gref [Accessed 8 May 2018].
Jahankhani, H. (2010). Handbook of electronic security and digital forensics. New Jersey: World Scientific.
Sleuthkit.org. (2018). Autopsy: Description. [online] Available at: https://www.sleuthkit.org/autopsy/desc.php [Accessed 8 May 2018].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download