Yes, general computer security professionals should become familiar with forensic computing and digital evidence management. More than that, they should also acquire cybersecurity skillset covering a broad spectrum. It is important in the modern-day business world for general professionals to become experts in specific areas. This is to ensure that businesses can protect themselves from cybercrime with low-cost investments (Casey, 2018). Moreover, there are several reasons for the same:
Thus, it is not financially viable for companies to hire these resources. Instead, there is an alternate that the companies prefer which is a low-cost solution as well. The companies engage with these specialists and get them to train their current cybersecurity architects or subject matter experts. In this way, the digital forensics specialists are not bound to one specific company, which manages the demand and supply challenge. They can consult for multiple companies on several different projects and that solves the company's challenge of cost element as well.
Similarly, acquiring some broad cybersecurity skills than just a specific skill is beneficial for the employees as well. They can cross skill and upskill themselves on several technologies and grow up in their career. For the companies investing in training will always remain a cheaper alternative to investing in individual skillset resources. In this way, they can have a pool of undergraduate engineers and then cross skill them towards their technology roadmap. In this way which the company is implementing changes in their landscape, a team grown from in house resources can lead and manage the technology stack, without the need to hire outside resources.
The current team who has limited knowledge based on their limited exposure in undergraduate schooling in specific areas of cybersecurity of computer science will find it difficult to manage the cross-skilling and doing regular business unit work at the same time. In this way, the companies can ensure that they are providing enough time for these resources to train themselves and create a plan which is not hampering with their day to day business activities. Some of the employees would need to be guided and motivated as well, to help them understand the benefits that lie for them once they get the right set of skillset and training. The company should invest in employee motivation because inherently this will be beneficial for the organization in the long run.
There are several challenges associated with investigations of crimes that are computer-related. The criminals who commit these crimes have a sound technological advantage that works in their favor. As a result, they can perpetuate some of the most technologically advanced levels of crimes without leaving a lot of digital footprints that can be traced back to them. it is the job of the investigators at the cybercrime unit to ensure that they do a deep and thorough analysis of the overall crime to separate the right set of information that can help them catch the cybercriminals. Tracking and finding the right set of evidence, thus, becomes not just critical but also necessary. However, to do so there are several challenges that they need to overcome. These can be on the lines of jurisdiction over the area, expertise in the technology, investigation workflow and processes, etc. (Cohen, 2017). Some of the key challenges have been described in the section below:
There are several reasons why the staff would need to access data in the Windows environment and turn that into digital evidence. The most common reason is when disgruntled employees leave the organization they are suspected to carry company proprietary data that they feel they have the right or ownership of. This may include documents, source codes, files, presentations, financial information, etc. From a company point of view, this data loss is a breach of their policy and to ensure that the employees or anyone else have taken the data away from the company assets in the company network with the possibility of it getting misused they have to ensure that they have mechanisms in which they can turn this into digital evidence. This can be done using dedicated and sophisticated software that can help the companies in tracking these cybercriminals effectively (Cybercrime Investigations, 2020). The following ways can be leveraged to find digital evidence against the perpetrators:
There are several ways in which Magnet Axiom can be leverage by the staff to process the evidence and convert it to digital evidence for the investigation (Magnet Axiom, 2020). The following ways can be leveraged by using Magnet Axiom:
Casey, E. (2018). Experimental design challenges in digital forensics. Digital Investigation, 9(3-4), 167-169. https://doi.org/10.1016/j.diin.2013.02.002
Cohen, F. (2017). Putting the Science in Digital Forensics. Journal of Digital Forensics, Security and Law. Doi: https://doi.org/10.15394/jdfsl.2011.1085
Cybercrime Investigations. (2020). The Challenges of Cybercrime Investigations and Prosecution. Institute of ICT Professionals, Ghana. Retrieved 6 May 2020, from https://iipgh.org/the-challenges-of-cybercrime-investigations-and-prosecution/.
Kessler, G. (2008). Book Review: Challenges to Digital Forensic Evidence. Journal of Digital Forensics, Security and Law. Doi: https://doi.org/10.15394/jdfsl.2008.1037
Larson, S. (2016). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Journal of Digital Forensics, Security and Law. Doi: https://doi.org/10.15394/jdfsl.2014.1165
Magnet Axiom. (2020). Getting Started With Magnet AXIOM - Magnet Forensics. Magnet Forensics. Retrieved 6 May 2020, from https://www.magnetforensics.com/resources/getting-started-magnet-axiom/.
TCDI. (2020). Using Computer Forensics to Investigate Employee Data Theft. TCDI | Computer Forensics | Cybersecurity | Litigation Technology. Retrieved 6 May 2020, from https://www.tcdi.com/computer-forensics-whitepaper-trevor-tucker-joe-anguilano-tim-opsitnick/.
Vassilaki, I. E. (1995). Computer Related Crime-Report on the Activities of the ''European Committee of Experts on Criminal Procedural Law Problems Connected with Information Technology'' of the Council of Europe. Computer Law & Security Review: The International Journal of Technology Law and Practice, 4(11), 210-211.
Remember, at the center of any academic work, lies clarity and evidence. Should you need further assistance, do look up to our Computer Science Assignment Help
Proofreading and Editing$9.00Per Page
Consultation with Expert$35.00Per Hour
Live Session 1-on-1$40.00Per 30 min.
Doing your Assignment with our resources is simple, take Expert assistance to ensure HD Grades. Here you Go....
My Assignment Services acknowledges the academic integrity guidelines prescribed as per Australian Universities to ensure that the services, sample material, and study resources available on our website, in no way are utilised to commit academic misconduct of any type. All users of our services must adhere to and affirm acceptance of all conditions elucidated in our policy document on academic integrity.