Specific Instructions for the Term Paper:
Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
1. Include a title page for your own paper. This includes the “Running Head” in the page header, the title of your paper, and your name. If you don’t know how to edit a header in Word, Google for instructions on how to edit a header in the version of Word you are using and follow the instructions. Also add the university and class info as well as the date authoring the paper.
For each major section of the paper, you will need to add sub-headings. You may need as many subheading as needed, but each section must have a minimum of three sub-headings. Be sure to be descriptive in your sub-heading names, so that the content following the subheading is informative.
More info on the body of the paper: Write the introductory paragraphs of your term paper (following the table of contents page) underneath the title of your paper. The introductory paragraphs should be at least one page long. These paragraphs should provide the reader with an overview of what you are covering. Your full 4-6 page term paper is due at the end of Week 7. In addition to the 4-6 pages of the paper itself, you must include a title page (abstract and table of contents pages) and a references page. Your title page must include the title of your paper, the date, the name of this course, your name, and your instructor’s name, as well as the university info and the date paper was written.
Your paper must be on a computer related crime which can be solved by using computer forensics. You must detail the procedures used in discovering and investigating the evidence. Discuss the case, the investigation process, data recovery, securing the evidence and chain of custody. Remember to explain the types of software you would use to complete the case. You may use the cases noted in the book for guidance or may use one of your own.
Running head: COMPUTER FORENSICS AND BEC FRAUD
Applying computer forensics in the solution of BEC Fraud
Robert Ramos
11/19/2019
1
COMPUTER FORENSICS AND BEC FRAUD
2
Applying computer forensics in the solution of BEC Fraud
Since 2015, a pernicious and rapidly growing form of cybercrime called Business
Email Compromise (BEC) fraud has occasioned the loss of more than $3 billion by American
entities (FBI, 2017). BEC fraud targets entities of all sizes and is often so elaborately
constructed that it remains undetected until it is too late. Since transnational criminal entities
are usually behind BEC schemes, apprehending the culprits—especially where they have
already laundered the proceeds via “money mules” and wired them to untraceable accounts—
is very difficult but email forensics and disk drive analysis of suspects’ computers may
provide a solution.
BEC Fraud- Definition, description, and financial impact
Business e-mail compromise (BEC) fraud, also referred to as CEO impersonation,
entails the use of deceptive strategies like identity theft, spearfishing, social engineering, and
email spoofing to impersonate senior employees such as CEOs, or trusted clients and defraud
organizations into releasing data or approving false payments (FBI, 2017).
Computer Forensics
–
Description of email forensics and its application in discovering, investigating, and
tracing culprits
–
Using disk drive analysis to uncover incriminatory evidence
–
Types of software to use for disk drive analysis
Handling and Securing of Evidence
–
Preservation of original evidence
–
Analysis of copy of evidence
–
Chain of custody in handling evidence
Conclusion
COMPUTER FORENSICS AND BEC FRAUD
References
FBI. (2017, February 27). Business E-Mail Compromise. Retrieved November 19, 2019,
from https://www.fbi.gov/news/stories/business-e-mail-compromise-on-the-rise
3
Turn in your highest-quality paper
Get a qualified writer to help you with
“ ISSC351 American Military University Cybercrime and Digital Forensics Term Paper ”
Get high-quality paper
Guarantee! All work is written by expert writers!