Deconstruct the processes and goals of cyber forensics investigations including the importance of search warrants and chain of custody in a forensic investigation of computer related crimes). For this week’s assignment instructions, please see below:
You are tasked as the Cyber Security Analyst at your new organization to assist Law Enforcement with investigating a digital crime.
For the purpose of this assignment, you are to search the Internet for a recent Digital Crime or Cyber attack on an actual organization (and that will be your new organization). Use the Tasks outlined below (and feel free to add your own steps) and create an in-depth plan that that provides a well thought out approach (what you propose to do to carry out each task) to investigate the crime.
Cybersecurity Investigation & Forensic Methodology (Tasks):
– Investigate the crime or the scene of the incident
– Reconstruct the scene or incident
– Collect the digital evidence, and make a copy of the original data
– Analyze the evidence using inductive and deductive forensic tools
– Establish linkages, associations and reconstructions
– Use the evidence for the prosecution of the perpetrators