Develop your own, working definition of cyber crime. Explain the methodology of gathering evidence in a cyber crime investi

 

Cybercrime Investigation Methods

Prior to beginning work on this assignment read the Sinduh and Meshram (2012) article (Links to an external site.). It is also recommended you review the Brown (2015) article (Links to an external site.) before writing your assignment. Review the instructions below and research a minimum of two additional scholarly or professional sources to support your statements. (Access the MSCJ Professional Sources guide (Links to an external site.) for assistance with finding appropriate professional resources.)

As you have learned thus far, cyber crimes being committed create a new vanguard for law enforcement and prosecution of criminal actions. The commonplace notions of physical crime scenes, standard and material evidence collection, and well-established, traditional steps of an investigation do not necessarily apply in the “cyber world.” With a need for change in how cyber crimes are investigated, you will examine current cyber crime investigations methods in this assignment.

For this assignment you will prepare a three to five page (750 to 1250 words) paper detailing the major components of cybercrime investigation. Including the following elements in your narrative:

  • Develop your own, working definition of cyber crime.
  • Explain the methodology of gathering evidence in a cyber crime investigation.
  • Analyze the methods of evidence collection, analysis and preservation.
  • Explain the legal challenges for both private security and police agencies related to cyber crime investigation methods and practices.

The Cybercrime Investigation Methods paper

  • Must be three to five double-spaced pages (750 to 1250 words) in length (not including title and references pages) and formatted according to APA style as outlined in the UAGC Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least two scholarly sources in addition to the required course materials.
  • Must document all sources in APA style as outlined in the UAGC Writing Center.
  • Must include a separate references page that is formatted according to APA style as outlined in the UAGC Writing Center.

 

Required Resources

Article

Sindhu, K. K., & Meshram, B. B. (2012). Digital forensics and cyber crime datamining (Links to an external site.). Journal of Information Security, (3), 196-201. Retrieved from http://www.scirp.org/journal/PaperDownload.aspx?DOI=10.4236/jis.2012.33024

  • This article discusses the various tools and techniques being used in the field of digital forensics as well as suggesting a systematic approach to the science. Accessibility Statement does not exist.
    Privacy Policy does not exist.

Multimedia

Aspinall, W. (Director & Producer). (2014). Heists: Cybercrimes with Ben Hammersley (Links to an external site.) [Video file]. Retrieved from https://secure.films.com/OnDemandEmbed.aspx?token=109729&wID=100753&plt=FOD&loid=0&w=560&h=315&fWidth=580&fHeight=365

Recommended Resources

Article

Brown, C. S. D., (2015). Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice (Links to an external site.). International Journal of Cyber Criminology, 9(1), 55-119. doi: 10.5281/zenodo.22387. Retrieved from http://www.cybercrimejournal.com/Brown2015vol9issue1.pdf

  • This open access article centers on the systemic issues that face investigators when taking on a cyber crime scene. The topic of potential regulatory changes related to cyber crime investigation is also discussed.

Report

United States Department of Justice. (2008). Electronic crime scene investigation: A guide for first responders, second edition (Links to an external site.)[PDF]. https://www.ncjrs.gov/pdffiles1/nij/219941.pdf

  • This source provides pragmatic and practical information necessary to individuals collecting evidence of cyber crime evidence for prosecution. The governmental report provides step by step guidance for “first responders” and is considerate of the unique nature of each crime scene encountered. The report focuses upon preserving electronic crime scenes and provides methods for recognizing, collecting, and safeguarding digital evidence.

Websites

MSCJ Resources (Links to an external site.) (http://ashford-mscj.weebly.com/)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.
    Accessibility Statement does not exist.
    Privacy Policy does not exist.

    Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

    Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

    Do you need an answer to this or any other questions?