Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
What are the effects of internet banking on banking operations
Don’t take our word for it - see why 10 million students trust us with their essay needs.
TABLE OF CONTENTS
1. INTRODUCTION 1
2. CONTENT 1
2.1 Definition of concepts 1
2.1.1 Digital investigation 1
2.1.2 Digital forensic investigation 2
2.1.3 Internet banking 2
2.2 Investigating the case 2
2.2.1 Evidence identification 2
2.2.2 Evidence preservation 7
2.2.3 Evidence analysis 9
2.2.4 Warnings 10
3. CONCLUSION/SUMMARY 11
REFERENCES 11
1. INTRODUCTION
The advancement in information technology results in the introduction of electronic facilities that address the problems posed by the traditional banking methods where people spend time at the bank waiting to be assisted. The Internet is one of the technological innovations that introduce Internet banking. Services provided by Internt banking are characterized by flexibility and convenience to users. Apart from the advantages of Internet banking, the security of Internet banking is questionable.
In this assignment, a case of theft was reported by victims whose bank accounts were accessed by unauthorized users and money was transferred to unknown accounts without their authorization. All victims make use of the bank’s Internet banking facility and also make use of the mobile operator, Hermes Network. The investigation should therefore be conducted in the case of theft that involve users of Internet banking.
2. CONTENT
2.1 Definition of concepts
In this assignment, the concept of digital investigation is defined as it is integral when dealing with issues of digital forensic investigation.
2.1.1 Digital investigation
Digital investigation is a process of answering questions about digital states and events. The process involves t...
... middle of paper ...
...ly as the loss of power does not affect data (Solomon et al 2011: 85).
3. CONCLUSION/SUMMARY
Internet banking is a useful banking facility that address problems posed by the traditional banking methods where people spend time at the bank waiting to be assisted. The Internet provides convenience and speed. The security of Internet banking is however questionable as users experience fraudulent activities from time to time. Money is withdrawn from users’ accounts without their knowledge. It is therefore important for users to make sure that they verify the security of the Website before performing any transaction.
Digital forensic investigators have a difficult task of collecting forensic evidence, preserving the evidence and analyzing or examining such evidence to make sure that the integrity of the media can be used in future in the court of law.
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Maras, M. (2012). Computer Forensics: Cybercriminals, Laws, and Evidence. Sudbury. Jones and Bartlett Learning LLC.
Identity theft is a term used for describing criminal that uses individual’s identity without consent. A common crime of identity theft would be identity fraud. Many of the crimes are regularly connected with money-related issues (Reyns, 2013). With technology being commonly used nowadays we are getting more dependent on it for business, financial, medical, and other forms. As a result this became a target for identity thieves as well. The Internet provides us information and accessibility, but information being stored on the Internet eas...
Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. July 2012. Computer Crime and Intellectual Property Section. 26 Oct. 2013. .
The transitional growth in the forensic science sector has not been without challenges. Though the world has experienced increased capabilities and scientific knowledge, which has led to faster investigations and results, many forensic experts have argued that forensic laboratory testing, in the light of 21st century technological advancements, is yet to meet the expected rate in quick available testing and analysis (Mennell & Shaw, 2006). This is with respect to the growing rate of crime and the high demand of quick crime scene testing and analysis. In the science of crime scene, analysis and interpretation of evidence is majorly dependent on forensic science, highlighting the change in the role of forensic sciences (Tjin-A-Tsoi, 2013). In the business of forensic science, time is beginning to play important role in the evidence testing and analysis which is becoming crucial in reducing ...
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
Tool mark analysis- This is where the forensic investigators will photograph or sketch (when the whole area can’t go to the lab) impressions made by tools used in the crime. At the lab, they will compare tools and marked objects to identify specific tools. 3 types of tool mark impressions are: compressions; pressed into soft materials, sliding; tool scrapes across surfaces, and cutting; a combination of both compression and sliding.
Digital Forensic is described as “ a forensic science encompassing the recovery and investigation of materials found in digital devices “ (“Introduction to Digital Forensics,” 2011). The objective of digital forensics is to implement a well-structured investigation while preserving a documented chain of custody and evidence custody form to know what really occurred on digital devices and who was accountable for it.
Studying everyday and finally finishing your post-secondary education, majoring in Criminal Justice or another major in that field, you can finally land your career. As a Forensic Scientist, you’re most likely going to work for the Federal Law Enforcement, to examine & collect evidence from crime scenes such as hair, nails, fingerprints, and/or fibers. The goal in this field is to convict an alleged perpetrator of an underlying crime. As a result of this goal, it is essential for those involved in the investigation process to preserve the evidence collected.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
The biggest challenge investigators face and who is involved with high tech crime is the fast-paced constant evolving nature of technology. When companies come out with new devices or new versions of old devices which is almost all the time, and those who gather digital evidence must remain current to be able to locate and preserve all potential evidence. As technology evolves the capacities of these devices will rapidly increase while their form factor grows continually smaller. Investigators must preserve digital evidence to make sure it is suitable for presentation in court as well. Investigators must first never change a crime scene or alter evidence. It is their goal to document and preserve the scene exactly as it was when the crime occurred. Extreme caution and care is needed because the mere act of documenting or cataloging a crime scene means that investigators are interacting with the scene. The second concern is the physical fragility of the evidence. Care must be taken to keep items from getting wet, stepped on etc, this can also be applied to digital evidence. Investigators have been able to examine hard disk drives that have been through fires because the drives are usually air and water tight and impervious to temperatures into the thousands of degrees. The third issue is that digital evidence can be lo...
Then reports that will represent the information gathered are written (“Computer Crime Investigation Using Forensic Tools and Technology”). As digital technology continues to advance, methods are kept up to date and
There are many aspects and procedures in crime scene investigation that are very essential in each case that is presented. Evidence collection, preservation, documentation and the role Digital Image Capture and Processing are important keys in any investigation. There are protocols that must be followed to protect the integrity of the evidence that is collected. In many instances, cases are lost due to contamination and improperly collecting evidence. To ensure that these steps are taken when collecting evidence, photographs must be taken and documented.
When using electronic payments there is always a risk that you online account could be hacked and funds diverted into another account. Online banking means that online banks contain you personal details. If that bank were to be hacked your personal details could be stolen which include such things as your iden...
It is true, that Internet Banking is useful for customers as well as for the banks. On the one hand, it helps people have direct and quick access to their bank accounts, on the other hand, helps the banks to save costs. ‘Clearly, in order to conti...