Cybercrime Investigation Methods Prior to beginning work on this assignment.docx
1. Cybercrime Investigation Methods Prior to beginning work on this
assignment
Cybercrime Investigation MethodsPrior to beginning work on this assignment read the
Sinduh and Meshram (2012) article (Links to an external site.). It is also recommended you
review the Brown (2015) article (Links to an external site.) before writing your assignment.
Review the instructions below and research a minimum of two additional scholarly or
professional sources to support your statements. (Access the MSCJ Professional Sources
guide (Links to an external site.) for assistance with finding appropriate professional
resources.)As you have learned thus far, cyber crimes being committed create a new
vanguard for law enforcement and prosecution of criminal actions. The commonplace
notions of physical crime scenes, standard and material evidence collection, and well-
established, traditional steps of an investigation do not necessarily apply in the “cyber
world.” With a need for change in how cyber crimes are investigated, you will examine
current cyber crime investigations methods in this assignment.For this assignment you will
prepare a three to five page (750 to 1250 words) paper detailing the major components of
cybercrime investigation. Including the following elements in your narrative:Develop your
own, working definition of cyber crime.Explain the methodology of gathering evidence in a
cyber crime investigation.Analyze the methods of evidence collection, analysis and
preservation.Explain the legal challenges for both private security and police agencies
related to cyber crime investigation methods and practices.The Cybercrime Investigation
Methods paperMust be three to five double-spaced pages (750 to 1250 words) in length
(not including title and references pages) and formatted according to APA style as outlined
in the UAGC Writing Center (Links to an external site.).Must include a separate title page
with the following:Title of paperStudent’s nameCourse name and numberInstructor’s
nameDate submittedMust use at least two scholarly sources in addition to the required
course materials.Must document all sources in APA style as outlined in the UAGC Writing
Center.Must include a separate references page that is formatted according to APA style as
outlined in the UAGC Writing Center. Required ResourcesArticleSindhu, K. K., & Meshram, B.
B. (2012). Digital forensics and cyber crime datamining (Links to an external site.). Journal
of Information Security, (3), 196-201. Retrieved from
http://www.scirp.org/journal/PaperDownload.aspx?DOI=10.4236/jis.2012.33024This
article discusses the various tools and techniques being used in the field of digital forensics
as well as suggesting a systematic approach to the science. Accessibility Statement does not
2. exist.Privacy Policy does not exist.MultimediaAspinall, W. (Director & Producer). (2014).
Heists: Cybercrimes with Ben Hammersley (Links to an external site.) [Video file]. Retrieved
from
https://secure.films.com/OnDemandEmbed.aspx?token=109729&wID=100753&plt=FOD&
loid=0&w=560&h=315&fWidth=580&fHeight=365Recommended ResourcesArticleBrown,
C. S. D., (2015). Investigating and prosecuting cyber crime: Forensic dependencies and
barriers to justice (Links to an external site.). International Journal of Cyber Criminology,
9(1), 55-119. doi: 10.5281/zenodo.22387. Retrieved from
http://www.cybercrimejournal.com/Brown2015vol9issue1.pdfThis open access article
centers on the systemic issues that face investigators when taking on a cyber crime scene.
The topic of potential regulatory changes related to cyber crime investigation is also
discussed.ReportUnited States Department of Justice. (2008). Electronic crime scene
investigation: A guide for first responders, second edition (Links to an external site.)[PDF].
https://www.ncjrs.gov/pdffiles1/nij/219941.pdfThis source provides pragmatic and
practical information necessary to individuals collecting evidence of cyber crime evidence
for prosecution. The governmental report provides step by step guidance for “first
responders” and is considerate of the unique nature of each crime scene encountered. The
report focuses upon preserving electronic crime scenes and provides methods for
recognizing, collecting, and safeguarding digital evidence.WebsitesMSCJ Resources (Links to
an external site.) (http://ashford-mscj.weebly.com/)This resource site will provide
assistance in researching additional sources for the assessments within this
course.Accessibility Statement does not exist.Privacy Policy does not exist.