Table of Contents……………………………………………………………………………Page
Purpose……………………………………………………………………………………………3
Introduction………………………………………………………………….……………..…….3
Meetings and Agenda……………………………………………………………………………..3
Required Forensic Tools and Techniques…………………………………………….……….…4
Checklist of Forensic Equipment and Resources…………………………………….………….5
Legal Information………………………………………………………….……………………6
Investigative Process………………………………………………………………….…………6
Interview Forms and Questions……………………………………………………………….11
Investigative Timeline………………………………………………………………….………12
Investigative Budget………………………………………………………………………….…13
Conclusion………………………………………………………………………………………14
References………………………………………………………………………………………16
Investigation Project Plan
Purpose
The main objective of this digital forensic investigation plan is to determine how a cybercrime occurred for the company. Various forensic steps will be involved for effective investigation and find the reason for the activity occurrence. Meetings will be held with various parties in the company to obtain key information that will be in investigation. Interviews with key parties such as IT directors, coworkers, and witnesses to further assess the situation and events that led to an action happening. The investigators will ensure forensic tools necessary for the investigations are in place and set the process in motion.
Introduction
Investigation entails searching for facts particularly those that are hidden in a complex situation to determine why and how something occurred. In the cyber domain, an investigation is essential in gathering the required data in a complicated matter which can be done digitally, verbally, or physically. The cyber domain is experiencing high-level criminal activities that require different skills in solving or investigating the crimes committed by attackers. Cybercrime is an illegal activity where a computer, network, and networked devices are involved as weapons to commit a crime (Brush, 2020). On the other hand, digital forensic in the cyber domain is when an investigation and a critical analysis are applied to collecting and preserving evidence from a device that was used to commit a crime for demonstration in court during a hearing.
Meetings and Agenda
The first meeting after the incident will be between the digital forensic investigators and the company management or key people in the company. They include the chief executive officer, IT directors, managers, and supervisors of the affected departments. The main agenda in the meeting will be the top leadership of the company to give a briefing about the crime to the forensic team, give key information about the company network and systems, and outline specific areas that need to be given more attention when the investigation starts. Further, the leadership should give the timeframe they will need the investigation to be completed. The forensic investigators will inform the company of what is needed after the briefings. In this first meeting, the budget for the investigation will be discussed by both sides the company and the investigators. The second meeting will be between the company’s top leadership, the digital forensic investigators, and the witnesses in the case. In the meeting, the witnesses are expected to give specific information regarding the incident because they are the first individual to detect intruder activities. The third meeting will be between the company, the digital forensic investigators, the witnesses, and the coworkers of the intruder. The meeting will be focusing on intruder coworkers to give details on the information accessed, the location of the activity, among the key things that will help for investigation.
Required Forensic Equipment and Techniques
During the investigation process, the investigators, reports, and facts can only be successful when necessary methods and equipment are applied. In a criminal investigation, digital forensic techniques and equipment are essential in the investigation of intruders, stimulation and accessing of events that transpired in cybercrime, and the preservation of evidence obtained during the process. The equipment employed in digital forensic are designed to enable investigators to capture the information technology and cyber image environments. The obtained images are used to determine the way a malicious intruder managed to compromise the system and various actions taken in the compromised system. The procedures enable individuals investigating to find any loopholes in the system which intruders utilized to commit a crime. According to Leo Cyber Security (2017), digital forensic equipment can be grouped into several sets which include Hard Drive and Data capture equipment, File analysis equipment, Internet analysis equipment, Registry and memory analysis Equipment, Email analysis tool, Network forensic analysis tool, Mobile device analysis tool, and Database forensic tools. Other common digital forensic equipment includes X-Ways Forensics, WndowsSCOPE, Wireshark, Cain and Abel, Computer Aided Investigative Environment (CAINE), Computer Online Forensic Evidence Extractor (COFEE), Registry Recon,EnCase, Sleuth Kit, among others (H-11 Digital Forensics, 2018)
Checklist of Forensic Equipment and Resources
There are various steps and resources needed for the effective running of digital forensic investigation.
Legal Information
In the digital forensic investigation of the cybercrimes committed, there are various fundamental considerations investigators should observe such as synchronization with the local authority regarding the matter. The local authority in some cases asks for more information regarding the chain of evidence after the case preparation and ready for a court trial. The legal information that the investigators should be aware of is ensuring the scope of the search, checking for any possible matters relating to federal statutes applicable such as the Cable Communications Policy Act (CCPA) and Electronic Communications Privacy Act (ECPA), Privacy Protection Act (PPA), State statutes and local policies and laws such as Digital Millennium Copyright Act, Computer Fraud and Abuse Act, and Federal Wiretap. Digital forensic investigators should consider contacting the legal authorities in the event where the search for evidence cannot be restricted.
Investigation Process
During a digital forensic investigation, dealing with evidence is fragile and volatile and the inappropriate management of the evidence acquired can lead to altering it. Thus, due to the digital evidence fragility and volatility, measures have to be put in place like following protocolsto ensuring that information acquired is not altered during its handling. These proceduresoutline the stages to be monitored when managing digital evidence obtained. For effective management of digital evidence, there are four stages employed in the initial handling of digital evidence which include identification, collection, acquisition, preservation, analysis, and reporting.
Interview Forms and questions
Interview questions for witnesses
Interview questions for coworkers
Interview questions for the company
Investigative Timeline
In a digital forensic investigation, time is an important element that the investors must put into consideration especially when performing digital forensic analysis. To effectively complete the whole digital forensic investigation process and perform all phases efficiently, time must be estimated allocating each stage time required to finish particular tasks. Various studies have discovered that it takes an average of nine months to identify, collect, acquire, preserve, analyze, and issue a comprehensive report on digital evidence obtained. The following are vital activities or phases that make up the time estimation of the digital forensic investigation. These activities include meetings with various parties in the company, interviews with key parties, identification of the information, collection of information, acquisition of evidence, preservation of acquired evidence, analysis of the evidence collected, evidence presentation or reporting, and decisions taken on evidence basis by the court. The following table displays each activity with the time estimate required for completion.
Table 1:Timeline
| Activity | Period |
| Meetings with various parties in the company | 3 Weeks |
| Interviews with key parties in the company | 3 Weeks |
| Identification of information | 3 Weeks |
| Collection of information | 1 Month |
| Acquisition of evidence | 1 Month |
| Preservation of acquired evidence | 2 Months |
| Analysis of evidence collected | 1 Month |
| Evidence presentation or reporting | 1 Month |
| Court’s decisions on evidence presented | 1 Month |
Investigative Budget
Forensic digital investigations can be costly depending on the size of the organization as the larger it is the more data it will have that will need to be examined (Ellis, 2016).The investigation can involve one or more forensic investigators examining a mountain of data for the company. The following are tables showing the costs for equipment budget and labor budget.
Table 2: Equipment Budget
| Equipment | Amount |
| Card brand compromise fees | $5,000 – $5,000,000+ |
| Free credit monitoring for affected individuals | $10 – 30/card |
| Card re-issuance penalties | $3 – $10 per card |
| Security updates | $15,000+ |
| Breach notification costs | $1,000+ |
| Technology repairs | $5,000+ |
Table 3: Labor Budget
| Labor item | Amount |
| Forensic Investigators fee | $5,000 – $50,000 |
| Lawyer fee | $5,000+ |
| Onsite QSA assessments following the breach | $20,000 – $100,000 |
Conclusion
The digital forensic investigation in the cyber world is essential especially when an act has been committed by the attacker. The key information should be availed by relevant individuals in the case comprehensively ensuring nothing is missed which can cause stagnation in the investigation. Forensic tools and resources should be assembled for the forensic investigators to perform their work effectively. The investigation phases such as identification, collection, acquisition, preservation, analysis, and reporting should be observed if the investigation team will need to have a relevant conclusion after investigation. The time factor is essential to ensure the investigation process is completed as scheduled.
References
Brush, K. (2020). Cybercrime. TechTarget. Retrieved from https://searchsecurity.techtarget.com/definition/cybercrime
Ellis, D. (2016). What Does a Cyber Forensic Investigation Do and How Much Does It Cost? Security Metrics. Retrieved from https://www.securitymetrics.com/blog/what-does-cyber-forensic-investigation-do-and-how-much-does-it-cost
H-11 Digital Forensics. (2018). The Best Open Source Digital Forensic Tools. Retrieved from https://h11dfs.com/the-best-open-source-digital-forensic-tools/
Leo Cyber Security. (2017). Digital Forensic Tools. Retrieved from https://leocybersecurity.com/wp-content/uploads/2017/11/16-Digital-Forensic-Tools.pdf
Scientific Working Group on Digital Evidence (SWGDE). (2018). SWGDE Best Practices for Computer Forensic Acquisitions. Retrieved from https://drive.google.com/file/d/1KeEI1DUkSE2DSPZyPFEFIGfzbZS3-zZC/view
Scientific Working Group on Digital Evidence (SWGDE). (2018). SWGDE Best Practices for Digital Evidence Collection. Retrieved from https://drive.google.com/file/d/1zP4OgpRrj-t9sVGNcqndqIgsemq7u5XQ/view
Software Engineering Institute. (2016). Volatile Data Collection. Carnegie Mellon University. Retrieved from https://fedvte.usalearning.gov/courses/CSI/course/videos/pdf/CSI_D01_S05_T01_STEP.pdf
UNODC. (2019). Practical Aspects of Cybercrime Investigations and Digital Forensics. Retrieved from https://www.unodc.org/e4j/en/cybercrime/module-6/key-issues/handling-of-digital-evidence.html