ISSC351 American Military University Cybercrime and Digital Forensics Term Paper

Specific Instructions for the Term Paper:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • 1.  Include a title page for your own paper. This includes the “Running  Head” in the page header, the title of your paper, and your name. If you  don’t know how to edit a header in Word, Google for instructions on how  to edit a header in the version of Word you are using and follow the  instructions. Also add the university and class info as well as the date  authoring the paper.
  • For  each major section of the paper, you will need to add sub-headings. You  may need as many subheading as needed, but each section must have a  minimum of three sub-headings.   Be sure to be descriptive in your  sub-heading names, so that the content following the subheading is  informative.
  • More  info on the body of the paper: Write the introductory paragraphs of  your term paper (following the table of contents page) underneath the  title of your paper. The introductory paragraphs should be at least one  page long. These paragraphs should provide the reader with an overview  of what you are covering. Your full 4-6 page term paper is due at the  end of Week 7. In addition to the 4-6 pages of the paper itself, you  must include a title page (abstract and table of contents pages) and a  references page. Your title page must include the title of your paper,  the date, the name of this course, your name, and your instructor’s  name, as well as the university info and the date paper was written.
  • Your  paper must be on a computer related crime which can be solved by using  computer forensics. You must detail the procedures used in discovering  and investigating the evidence. Discuss the case, the investigation  process, data recovery, securing the evidence and chain of  custody. Remember to explain the types of software you would use to  complete the case. You may use the cases noted in the book for guidance  or may use one of your own.
  • Running head: COMPUTER FORENSICS AND BEC FRAUD
    Applying computer forensics in the solution of BEC Fraud
    Robert Ramos
    11/19/2019
    1
    COMPUTER FORENSICS AND BEC FRAUD
    2
    Applying computer forensics in the solution of BEC Fraud
    Since 2015, a pernicious and rapidly growing form of cybercrime called Business
    Email Compromise (BEC) fraud has occasioned the loss of more than $3 billion by American
    entities (FBI, 2017). BEC fraud targets entities of all sizes and is often so elaborately
    constructed that it remains undetected until it is too late. Since transnational criminal entities
    are usually behind BEC schemes, apprehending the culprits—especially where they have
    already laundered the proceeds via “money mules” and wired them to untraceable accounts—
    is very difficult but email forensics and disk drive analysis of suspects’ computers may
    provide a solution.
    BEC Fraud- Definition, description, and financial impact
    Business e-mail compromise (BEC) fraud, also referred to as CEO impersonation,
    entails the use of deceptive strategies like identity theft, spearfishing, social engineering, and
    email spoofing to impersonate senior employees such as CEOs, or trusted clients and defraud
    organizations into releasing data or approving false payments (FBI, 2017).
    Computer Forensics

    Description of email forensics and its application in discovering, investigating, and
    tracing culprits

    Using disk drive analysis to uncover incriminatory evidence

    Types of software to use for disk drive analysis
    Handling and Securing of Evidence

    Preservation of original evidence

    Analysis of copy of evidence

    Chain of custody in handling evidence
    Conclusion
    COMPUTER FORENSICS AND BEC FRAUD
    References
    FBI. (2017, February 27). Business E-Mail Compromise. Retrieved November 19, 2019,
    from https://www.fbi.gov/news/stories/business-e-mail-compromise-on-the-rise
    3

    Still stressed from student homework?
    Get quality assistance from academic writers!

    Order your essay today and save 25% with the discount code LAVENDER