StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Potential Forensic Techniques For Investigating Insider Attacks - Essay Example

Cite this document
Summary
Insider attacks occur when a user of an organization uses an unauthorized system to find information about the organization. In order to do this, the user must counter the computer security system and the forensic techniques used by this system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Potential Forensic Techniques For Investigating Insider Attacks
Read Text Preview

Extract of sample "Potential Forensic Techniques For Investigating Insider Attacks"

Topic: Discuss potential forensic techniques for investigating insider attacks. Also discuss how insider attackers can defeat these techniques. Insider attacks occur when a user of an organization uses an unauthorized system to find information about the organization. In order to do this, the user must counter the computer security system and the forensic techniques used by this system. Attacks done by inside users has proven to be more costly and harmful than the attacks done by outsiders as the inside users have more information about the internal processes of the organization and they also have an access to various resources of the organization.

Insider attacks is often destructive of the organization`s reputation as well. Therefore, all organizations must try to stop insider attacks and investigate these attacks through advanced forensic techniques. One such forensic technique is the intrusion detective system (IDS) which checks all incoming and outgoing network activities of an organization. It is a system which helps in identifying those patterns which are suspicious and which may indicate an attack as someone attempts to break into a system.

Although IDS may detect system attacks, it alone might not be able to deter both insider and outsider attacks. This is because the accuracy of IDS to detect attacks may affect the entire process of the organization. IDS may overlook an actual attack or even issue alerts for a normal event. This false positive may be highly costly for the organization as the IDS will collect useless data for a normal user. The costs of IDS include damage, operational as well as response costs. An organization should try to minimize these costs as much as possible so that normal system process is not affected.

Unfortunately, the IDS can be evaded by attackers who learn to act as legitimate users. In order to beat an anomaly detector, which detects discrepancies by comparing the current network to the baseline, the attacker should learn to impersonate as a legitimate user. Another forensic technique is proactive intrusion detection system which tries to overcome the limitations of IDS. This system tries to expose both the legitimate users and attackers to different modes of IDS, in a way that poses no threat to the legitimate users but detects those attackers who have learnt to use the system as legitimate users.

Therefore, these attackers will get detected by this forensic technique which is far more effective than a common IDS. 2. Discuss the techniques to identify potential on-line sexual crime that could be posted via online dating forums. You may use one example to illustrate this. Sexual crime includes different forms of sexual behaviour portrayed by humans. Different countries have unique laws pertaining to sexual crime. The western culture is more tolerant to some sexual activities but there are serious laws for other crimes for example rape, child sexual abuse, human trafficking etc.

other cultures with strong religious customs constitute a large range of sexual activities as crime. General sexual rules followed by most of the countries include laws against rape, sexual harassment. The law also requires the government or other authorities to regulate and control obscene material over the internet and censor these materials. With the advance of information technology, it has become difficult for authorities to regulate such activities, especially over the internet. Authorities have been able to investigate acts of crime involving terrorism, fraud etc but the number of these crimes have continued to increase.

These crimes are posing a threat to the continued advancement of technology and online sexual crime is on a rise. There are several techniques to identify potential online sexual crime and the most effective is to develop a forum where individual can file complaints against such crime. Regulating authorities of all countries should make it easier for citizens to file complaints against sexual crime by developing an easily accessible forum. The citizens should be made aware of such forums through advertising and other forms of promotions.

These forums can prove to be highly effective as the dating forums are often found by internet users through surfing and these individuals can then tell the authorities by filing complaints. Filing a complaint will not solve such problems. The authorities should make sure that these complaints are acknowledged and the offenders of sexual crime are punished. These complaint forums will give the citizens a chance to raise their voices against sexual crime such as child pornography and other obscene materials.

Another technique is to regulate and monitor all the dating forums and other related online sites. This can prove to be highly effective as the all materials posted or exchanged on such sites will be monitored by the appointed authorities and any offensive transaction or material could be easily traced to its source. This technique will also discourage such materials and exchanges, as the individuals will be aware of the close examination being done by the regulatory authorities. Works Cited: Question 1: "A layered approach to insider threat detection and proactive forensics.

" Insider threats. N.p., n.d. Web. 23 Oct. 2012. . "Proactive detection of insider attacks." Illinois Education. N.p., n.d. Web. 23 Oct. 2012.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Potential Forensic Techniques For Investigating Insider Attacks Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1459419-week8dq8
(Potential Forensic Techniques For Investigating Insider Attacks Essay)
https://studentshare.org/information-technology/1459419-week8dq8.
“Potential Forensic Techniques For Investigating Insider Attacks Essay”, n.d. https://studentshare.org/information-technology/1459419-week8dq8.
  • Cited: 1 times

CHECK THESE SAMPLES OF Potential Forensic Techniques For Investigating Insider Attacks

Contract tender process in the work environment

Its causes as well as the attributes and characteristics of those criminals responsible for this social malaise have been under scrutiny from different quarters: from the… This report takes a careful look at the what constitutes computer crime, the attributes and characteristics of computer criminals, the strategies to identify and prevent the criminals It is interesting that computer crime is compared with the crime of serial killing, but computer criminals are more subtle, erratic and evasive....
36 Pages (9000 words) Essay

Cybercrime Investigation and Digital Forensics

When such incidents happen, digital forensics renders a helping hand in investigating the potential crime scene with evidence that can be presented for prosecution.... Our investigation team comprises of security and digital forensic professionals who work in close coherence with highly experienced corporate investigators and a well-trained background verification team (“investigating a data breach,” n.... This report provides a detailed description of the investigation procedure from the perspective of a cyber forensic company's lead forensics investigator which would help in identifying and prosecuting a potential breach incident that happened in a healthcare company....
9 Pages (2250 words) Assignment

Digital Evidence: Understanding The Process and Challenges

This assignment describes Digital Evidence: Understanding the Process and Challenges.... This paper outlines computer forensics, the lifecycle of computer crimes, digital information, juridical and legal issues, problems and safety.... nbsp;… Traditional and newer forms of crimes are now increasingly being committed with the use of computers (Sahu, 2008, p....
13 Pages (3250 words) Assignment

Independent Expert Witness Use of Computer Forensic

At the basic level, computer forensics is the analysis of information contained within and created with computer systems, and techniques and methodologies are used for conducting computing investigations typically in the interest of figuring out what happened when it happened, how it happened, and who was involved.... There are many reasons to employ the techniques of computer forensics.... The paper "Independent Expert Witness Use of Computer forensic" highlights that generally, now many educational institutions are offering computer forensics degrees, and related education has become a minimum requirement to stay competitive in the industry....
10 Pages (2500 words) Coursework

The Knowledge of the Investigating Officer for the Success of the Investigation Process

According to a recent survey, ninety four percent of the respondents of the survey reported that they had detected cyber attacks on their computer systems in their companies and the same survey revealed that 617 companies had reported a total of six billion dollars in financial losses....
15 Pages (3750 words) Essay

The Key Principles of Cyber Forensics

… 1.... IntroductionIncreasing globalization and sophistication of the world's technological infrastructure has dramatically influenced logistics of criminal activities at both local and international levels.... With the wide availability of the internet, 1.... IntroductionIncreasing globalization and sophistication of the world's technological infrastructure has dramatically influenced logistics of criminal activities at both local and international levels....
17 Pages (4250 words) Essay

Forensic Data Analysis

Such kind of crime presents new challenges to forensic investigators because they are very difficult to investigate as to who actually did what.... It is due to this background that the field of forensic data analysis has emerged whereby this particular discipline is laying significant emphasis on; Network forensics, database forensics, cloud computing forensics, cyber forensics, and communication forensics among others....
15 Pages (3750 words) Essay

Cloud Computer Forensics

In a situation where the security of an organization's data is interfered with, then the services of computer forensic experts are sought.... This enables the business to continue with its regular operations while the migrated data is being exposed to forensic analysis.... These include law enforcement and the concerns are about the location of the potential digital evidence and the various methods used in its preservation....
14 Pages (3500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us