Question
Consider the following scenario. A new start-up SME (small-medium enterprise) based in Luton with an e-government model has recently begun to notice anomalies in its
Consider the following scenario.
A new start-up SME (small-medium enterprise) based in Luton with an e-government model has recently begun to notice anomalies in its accounting and product records. It has undertaken an initial check of system log files, and there are a number of suspicious entries and IP addresses with a large amount of data being sent outside the company firewall. The company has also recently received a number of customer complaints saying that there is often a strange message displayed during order processing, and they are redirected to a payment page that does not look legitimate.
You have employed a digital forensic investigator to determine whether any malicious activity has taken place and to ensure that there is no malware within the systems. Your task is to investigate the cause of the problems, and if necessary, to prepare a case against the perpetrators.
The company uses Windows Server 2008 for its servers. Patches are applied by the IT support team on a monthly basis, but the team has noticed that a number of machines do not seem to have been patched.
In a report, please address the following:
How you would apply rules and policies in this scenario
The legal aspects with regard to admissibility of digital evidence
Privacy issues when seizing personal mobile devices
Citation guidelines for IEEE: https://ieee-dataport.org/sites/default/files/analysis/27/IEEE%20Citation%20Guidelines.pdf
A grading rubric can be found within the Evaluation Rubrics
Grading criteria |
|
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started