Custom IS415 - Project Part 1 essay paper writing service

← Women Protection against ViolenceLegal Pluralism →

Buy IS415 - Project Part 1 essay paper online

The purpose of this research is to investigate and explore a corporate crime case study, identify the core areas of concern for a computer forensic investigation as well as describe the forensic tools that are required in evaluating these areas of concern. A corporate crime is defined as a crime committed by a corporation or an individual or a group of people associated to a corporation (Frank, & Lynch, 1992, p. 12). The chosen corporate crime case study for this research is the denial of service attack which involved Scott Dennis, an ex- computer system supervisor for the United States district court of Alaska (Seth, 2010).

Get a Price Quote:
Type of assignment
Title of your paper
Writer level
Number of pages
Total price

Scott initiated three attacks on denial of service on Judsys, a personal mail server corporate that is possessed and managed by the United States district court. In the process, he managed to block the system by overflowing it with several emails which resulted in the need to shut down of the computer sustaining Judsys and consequently being taken out of service. Investigation was done and Scott was identified as the one responsible by tracing the internet procedures to his private computer (Seth, 2010). In 2001, he was sentenced to 6 months in jail, 3 of home detention follow by a year of monitored release.

Denial of service attack is a sort of attack, commonly on web, that is intended to interrupt the usual function of the intended computer network thus making the computer resources unavailable to the users (Howes, Smith & Good, 2003, p. 415). The commonly used method of service attack is to propel a saturation of unremitting requests for outside communication to the targeted computer, thus creating a large occurrence of fake traffic such that the rightful web passage assigned for the authentic users is held back. Thus the core areas of concern for Scott's case would be; integrity of evidence, where everything associated to the case is kept under control so as to avoid alteration. Extraction is the next area of concern and involves duplication of the evidence without altering it (Jones, 2007). After the evidence has been extracted, the next step is to interpret it. Interpretation of evidence should be performed carefully and an expert should be invited to counter-check that the project results are the actual ones and not otherwise. The next stage is documentation. Its purpose is to reproduce the process so that another expert can use the same material and notes to arrive at the same conclusion as the first expert. The last area of concern is the rule of evidence where the admissibility, dependability and relevancy of the expert are determined (Jones, 2007).

Order now

For any forensic investigation to produce accurate results, there are several tools that are essentials for evaluating the above mentioned areas of concern. The first thing an investigator needs to do is to remove the suspected system. Live View is thus useful for creating a practical disk from the system that will allow the investigator to safely examine a replica of the system without messing about with any installed objects. Once the system has been rebooted, the investigator should download a StartupList and determine the things that might have been put in the system during restarting sessions. HijackThis can be used as a supplement the StartuList tool in ruling out evident malware (Bourque, 2008).

Live chat

The next action is to determine open files. In Linux, isof is used to list all open files by default. OpenFilesView can also be used as an additional tool that lists all processes and files in the system (Malin, Casey & Aquilina, 2008, p. 52). While the system is running, Wireshark can be used to locate anything that is sent out of the system to another destination unexpectedly. This tool also helps in determining any suspicious thing existing in the system. Helix 3 is also another tool that is used in forensic to evaluate the areas of concern. This tool is used to safely examine the disk so as to be sure of what has been altered/ interfered with (Bourque, 2008).

Order Now

Buy IS415 - Project Part 1 essay paper online

Related essays

  1. Legal Pluralism
  2. Math and Law
  3. Women Protection against Violence
  4. Sponsor a Summer Camp Project
order now
Live chat!
Planets Live support online chat Live support phone
Our Advantages
300 Words per page
Bottom line
12 pt Times New Roman Double-spaced typed page
Bottom line
MBA and PhD Writers
Bottom line
Relevant and up-to-date
Bottom line
US Writers
Bottom line
100% Quality Guarantee
Bottom line
24/7 Support
Bottom line
24/7 Live Chat
Bottom line
Flexible Discount Program
Bottom line
ANY Difficulty Level!

Thank you for the extraordinary work that your writer #2827 did on my thesis. I am quite pleased and will definitely do business with your service again in the future. I would like to add that Monica, who works in your customer service department, was more than a little helpful. She was very patient and answered each of my questions knowledgeably and politely. I truly appreciate the great writing and personal assistance. Thanks!

Mark M., Boston, MA, USA

The work that writer #8756 put into writing my research proposal was phenomenal! I am very happy with it and would hire this person to do writing assignments for me any time! is a remarkable writing service. I am so happy I listened to the advice of my classmate who recommended you.

John M., Broken Hill, AUS

I am writing in gratitude for the exceptional job that Writer #4312 did on my coursework. He perfectly matched output to topic and used very high quality research. The formatting was perfect, and he wrote in a clear, concise manner. My professor approved the coursework without reservation. I am so grateful to have found a top rate writing service such as yours. Thank you immensely, for the time, the quality and the effort. I will pass on my recommendations enthusiastically.

Betty C., Los Angeles, CA, USA

-15% first order  Order now