preview

Examination And Investigation Of Cyber Forensic Investigation Process Essay

Better Essays

Abstract
In December 2013, over 40 million credit cards were stolen from nearly 2000 Target stores by accessing data on point of sale (POS) systems. This paper will explore known issues in the Target breach. From what is known about the Target breach, there were multiple factors that led to data loss: vendors were subject to phishing attacks, network segregation was lacking, point of sale systems were vulnerable to memory scraping malware and detection strategies employed by Target failed. A possible solution for preventing and mitigating similar breaches using a prevention measures. Considerations of human factors that contributed to the losses in this case will also be addressed.

Table of contents
Abstract……………………………………………………………………………………………2
Introduction………………………………………………………………………………………. 4
Case overview…………………………………………………………………………………….5
How did it happened………………………………………………………………………………5
Cost of breach……………………………………………………………………………………..6
Quality Assurance Practices for Computer Forensics……………………………………….……7
Quality Control for Cyber Forensic Process………………………………………………………8
Cyber Forensic Investigation Process……………………………………………………………10
Recommendation………………………………………………………………………………...11
Conclusion……………………………………………………………………………………….13
References

Introduction
Forensics is the use of examination and investigation procedures to accumulate and save prove from a computing device in a way that is appropriate for presentation in a courtroom. The objective of computer

Get Access