Search Warrant and Database Research Paper

Total Length: 862 words ( 3 double-spaced pages)

Total Sources: 0

Page 1 of 3

Digital Forensics and Cyber Crime Investigation

HCC Partner is the top healthcare company in the United States, and the management has noticed an intrusion in the systems based on the alerts from their IDS (Intrusion Detection System) logs that causes the management to question the reliability of the system. Analysis of their systems reveals that HCC uses the Snort IDS that is running in Linux system. Moreover, the HCC database administrator has received and downloaded the strange email from the Human Resources Department, which makes the system behaving strangely after they open the attachment.

The objective of this project is to analyze the HCC database server, the network system and other workstations suspected leading to data leakage. The project will investigate whether there is a possibility of evidence of data breach.

A: Plan for Processing the Incident Scene and Potential Crime

The study uses the staircase model for the investigation processing because the model assists in enhancing a practical method for forensic investigation. Typically, digital forensic investigators work from the bottom in a systematic way.

Fig 1: Staircase Model

Source: Casey, (2011).

A

1. Method to Identify Potential Digital Evidence

The first strategy to identify the potential evidence is to trace the source of email attachment from the human resource department.
Essentially, all the emails communication and attachment will be stored in the database server. The next step is to the check the hard disk of the human resources computer to verify whether the email is sent from the HR department. The method to verify whether the email comes HR department is to search the company database server for all the emails sent to the database administrator the day the email is received. While email searching carried out manually can be time-consuming, however, we suggest using the X-Ways Forensics software for the automatic searching for the email.

If the email in the hard disk r database is deleted, the next process is to use the forensic software to recover the email deleted on this data. The study suggests using the Encase software to assist in retrieving the deleted emails. The tool has the ability to collect data from various devices, and assist in unearthing the evidence. If the file is sent from HR department, the next step is to scan the file to detect the presence of malicious software. The study suggests using one of the premium antivirus software to….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Search Warrant And Database" (2017, April 20) Retrieved May 21, 2025, from
https://www.aceyourpaper.com/essays/search-warrant-database-2164760

Latest MLA Format (8th edition)

Copy Reference
"Search Warrant And Database" 20 April 2017. Web.21 May. 2025. <
https://www.aceyourpaper.com/essays/search-warrant-database-2164760>

Latest Chicago Format (16th edition)

Copy Reference
"Search Warrant And Database", 20 April 2017, Accessed.21 May. 2025,
https://www.aceyourpaper.com/essays/search-warrant-database-2164760