Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. Carefully read each case and assign each DETAILED procedure or evidence presented in above given case study to the appropriate OSCAR investigation phase. The

image text in transcribed

image text in transcribed

image text in transcribed

1. Carefully read each case and assign each DETAILED procedure or evidence presented in above given case study to the appropriate OSCAR investigation phase. The objective of this question is to ORGANIZE the details of your assigned case and compare to an appropriate OSCAR phase. Do not worry if the case procedures do NOT exactly match OSCAR methodology. Rather, focus of the details of the case network forensic procedures.

OSCAR Investigation Methodology Phase

Investigation Procedure or Evidence of the Case

Obtain Incident Information

Obtain Environment Information

Strategize or plan for the investigation

Collect Evidence

Analyze Evidence

b) Brief summary of background information and potential risks

b.1 Tools used in the investigation process, including their purpose and any underlying assumptions associated with the tool

b.2 Evidence Item #1

a. Summary of evidence found

b. Analysis of relevant portions

Repetition of above steps for other evidence items (which may include other computers and mobile devices, etc.)

b.3 Findings or Results

b.4 Recommendations

1.1.1 Hospital Laptop Goes Missing A doctor reports that her laptop has been stolen from her office in a busy U.S. metropolitan hospital. The computer is password-protected, but the hard drive is not encrypted. Upon initial questioning, the doctor says that the laptop may contain copies of some patient lab results, additional protected bealth information (PHI) downloaded from email attachments schedules that include patient names, birth dates, and IDs, notes regarding patient visits, and diagnoses. 1.1.1.1 Potential Ramifications Since the hospital is regulated by the United States' Health Information Technology for Eco- nomic and Clinical Health (HITECH) Act and Health Insurance Portability and Account- ability Act (HIPAA), it would be required to notify individuals whose PHI was breached.2 If the breach is large enough, it would also be required to notify the media. This could cause significant damage to the hospital's reputation, and also cause substantial financial loss particularly if the hospital were held liable for any damages caused due to the breach. 1.1.1.2 Questions Important questions for the investigative team include: 1. Precisely wben did the laptop go missing? 2. Can we track down the laptop and recover it? 3. Which patient data was on the laptop? . How many individuals' data was affected? 5. Did the thief leverage the doctor's credentials to gain any further access to the hospital network? 11.1.3 Technical Approach Investigators began by working to determine the time when the laptop was stolen, or at least wben the doctor last used it. This helped establish an outer bound on what data could have been stored on it. Establishing the time that the laptop was last in the doctor's possession also gave the investigative team a starting point for searching physical surveillance footage and acoess logs. The team also reviewed network access logs to determine whether the laptop was subsequently used to connect to the hospital network after the theft and, if so, the location that it connected from

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Relational Database And Transact SQL

Authors: Lucy Scott

1st Edition

1974679985, 978-1974679980

Students also viewed these Databases questions

Question

2. Define communication.

Answered: 1 week ago

Question

5. Who should facilitate the focus group?

Answered: 1 week ago