Private Sector Investigations Flashcards

1
Q

Understanding Private-Sector Investigations

A

-Private-sector investigations involve private companies and lawyers who address company policy violations and litigation disputes
+Example: wrongful termination
-Businesses strive to minimize or eliminate litigation
-Private-sector crimes can involve:
+E-mail harassment, falsification of data, gender and age discrimination, embezzlement, sabotage, and industrial espionage
-Businesses can reduce the risk of litigation by publishing and maintaining policies that employees find easy to read and follow
-Most important policies define rules for using the company’s computers and networks
+Known as an “Acceptable use policy”
-Line of authority - who has the legal right to initiate an investigation, who can take possession of evidence, and who can have access to evidence
-Businesses can avoid litigation by displaying a warning banner on computer screens
+Informs end users that the organization reserves the right to inspect computer systems and network traffic at will

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Understanding Private-Sector Investigations Continued

A

-Businesses are advised to specify an authorized requester who has the power to initiate investigations. Should be incorporated into the Incident Response Plan.
-Examples of groups with authority
+Corporate security investigations
+Corporate ethics office
+Corporate equal employment opportunity office
+Internal auditing
+The general counsel or legal department
-During private investigations, you search for evidence to support allegations of violations of a company’s rules or an attack on its assets
-Three types of situations are common:
+Abuse or misuse of computing assets
+E-mail abuse
+Internet abuse
-A private-sector investigator’s job is to minimize risk to the company
-The distinction between personal and company computer property can be difficult with cell phones, smartphones, personal notebooks, and tablet computers
-Bring your own device (BYOD) environment
+Some companies state that if you connect a personal device to the business network, it falls under the same rules as company property
+Weigh your personal privacy before agreeing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maintaining Professional Conduct

A

-Professional conduct - includes ethics, morals, and standards of behavior
-An investigator must exhibit the highest level of professional behavior at all times
+Maintain objectivity
+Maintain credibility by maintaining confidentiality
-Investigators should also attend training to stay current with the latest technical changes in computer hardware and software, networking, and forensic tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preparing a Digital Forensics Investigation

A

-The role of digital forensics professional is to gather evidence to prove that a suspect committed a crime or violated a company policy
-Collect evidence that can be offered in court or at a corporate inquiry
+Investigate the suspect’s computer
+Preserve the evidence on a different computer
-Chain of custody
+Route the evidence takes from the time you find it until the case is closed or goes to court

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Overview of Company Policy Violation

A

-Employees misusing resources can cost companies millions of dollars
-Misuse includes:
+Surfing the Internet
+Sending personal e-mails
+Using company computers for personal tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Private-Sector High-Tech Investigations

A

-As an investigator, you need to develop formal procedures and informal checklists
+To cover all issues important to high-tech investigations
+Ensures that correct techniques are used in an investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Employee Termination Cases

A

-The majority of investigative work for termination cases involves employee abuse of corporate assets
-Incidents that create a hostile work environment are the predominant types of cases investigated
+Viewing pornography in the workplace
+Sending inappropriate e-mails
-Organizations must have appropriate policies in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internet Abuse Investigations

A

+Recommended steps
-Use standard forensic analysis techniques and procedures
-Use appropriate tools to extract all Web page URL information
-Contact the network firewall administrator and request a proxy server log
-Compare the data recovered from forensic analysis to the proxy server log
-Continue analyzing the computer’s disk drive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Email Abuse Investigations

A

-To conduct an investigation you need:
+An electronic copy of the offending e-mail that contains message header data
+If available, e-mail server log records
+For e-mail systems that store users’ messages on a central server, access to the server
+Access to the computer so that you can perform a forensic analysis on it
+Your preferred computer forensics analysis tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Industrial Espionage Investigations

A

-All suspected industrial espionage cases should be treated as criminal investigations
-Staff needed
+Computing investigator who is responsible for disk forensic examinations
+Technology specialist who is knowledgeable of the suspected compromised technical data
+Network specialist who can perform log analysis and set up network sniffers
+Threat assessment specialist (typically an attorney)
-Guidelines when initiating an investigation
+Determine whether this investigation involves a possible industrial espionage incident
+Consult with corporate attorneys and upper management
+Determine what information is needed to substantiate the allegation
+Generate a list of keywords for disk forensics and sniffer monitoring
+List and collect resources for the investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Interviews and Interrogations in High-Tech Investigations

A

-Becoming a skilled interviewer and interrogator can take many years of experience
-Interview
+Usually conducted to collect information from a witness or suspect
*About specific facts related to an investigation
-Interrogation
+Process of trying to get a suspect to confess
-Role as a computing investigator
+To instruct the investigator conducting the interview on what questions to ask
*And what the answers should be
-Ingredients for a successful interview or interrogation
+Being patient throughout the session
+Repeating or rephrasing questions to zero in on specific facts from a reluctant witness or suspect
+Being tenacious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Understanding Data Recovery Workstations and Software

A

-Investigations are conducted on a computer forensics lab (or data-recovery lab)
+In data recovery, the customer or your company just wants the data back
-Computer forensics workstation
+A specially configured PC
+Loaded with additional bays and forensics software
-To avoid altering the evidence use:
+Write-blockers devices
*Enable you to boot to Windows without writing data to the evidence drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Conducting an Investigation

A

-Gather resources identified in investigation plan
-Items needed
+Original storage media
+Evidence custody form
+Evidence container for the storage media
+Bit-stream imaging tool
+Forensic workstation to copy and examine your evidence
+Securable evidence locker, cabinet, or safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Gathering the Evidence

A

-Avoid damaging the evidence
-Steps
+Meet the IT manager to interview him
+Fill out the evidence form, have the IT manager sign
+Place the evidence in a secure container
+Carry the evidence to the computer forensics lab
+Complete the evidence custody form
+Secure evidence by locking the container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Understanding Bit-Stream Copies

A

-Bit-stream copy
+Bit-by-bit copy of the original storage medium
+Exact copy of the original disk
+Different from a simple backup copy
*Backup software only copy known files
*Backup software cannot copy deleted files, e-mail messages or recover file fragments
-Bit-stream image
+File containing the bit-stream copy of all data on a disk or partition
+Also known as “image” or “image file”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Completing the Case

A

-You need to produce a final report
+State what you did and what you found
-Repeatable findings
+Repeat the steps and produce the same result
-If required, use a report template
-Report should show conclusive evidence
+Suspect did or did not commit a crime or violate a company policy
-Keep a written journal of everything you do
+Your notes can be used in court
-Answer the six Ws:
+Who, what, when, where, why, and how
-You must also explain computer and network processes

17
Q

Peer Review

A

-Peer review is an independent validation of the findings and reports
+Based on available best practices, documentation, training and experience
-Subject your investigation report and findings to a peer review.
-Subject your forensic examination report and findings to a peer review.