Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: May 9th, 2022

Case Study Forensic Report

Mr. Ivan Cembalos contacted Jayden Forensics on June 20, 2020, in connection to a possible network intrusion at the JLA Enterprise. Mr. Cembalos made this contact because he wanted support in regards to investigating this Intrusion and also come up with a report about the Intrusion. The Intrusion appeared to have taken place between 0900 and 1505 hours at the JLA Enterprises headquarters and, in particular, at the corporate office section. This report aims to provide Mr. Cembalos with a detailed analysis of the situation to determine the origin of the Intrusion, establish the likely purpose of this attack, and also identify the documents, files or data that might have been compromised during the attack. The information described in this report is proprietary, and according to Mishra (2020), it means that anybody who views has consented to understand that the information within is only for official use and that the report will be subjected to acceptable personal privacy and user agreements at JLA Enterprise.
Jayden Forensics investigator, Granit Cole undertook a thorough investigation at the JLA Enterprises headquarters and, in particular, at the corporate office section on June 20, 2020, from 1000 hours to 1400 hours. From this investigation, Cole noticed that the timing of these attacks coincided with the office peak hours, which are between 0900 and 1230 hours. Upon setting up a meeting with Mr. Ivan Cembalos, and having been shown all the likely network compromise that took place at JLA Enterprise, Mr. Cole requested that all work stations should be locked temporarily until the investigation is complete. Additionally, he requested that all employees must be checked off their removable media before they left the office building. Mishra (2020) argues that these measures were meant to ensure that no one from the office would interfere with the ongoing investigations.
From the investigation conducted, it was discovered that the Chief Financial Officer at JLA Enterprise computers had made several communications with an employee of the corporate office when the Intrusion had taken place. Further analysis of the employee’s servers to his computers revealed that he had authorized the transfer of money to an authorized offshore bank account. The fact that the communication between this employee and the Chief Financial Officer took place at the same when this Intrusion was happening led to the suspicion that the CFO was involved or the mastered mind of this embezzlement. Approximately $1000, 000 was taken from JLA Enterprise.
We can prove that the CFO at JLA enterprise was involved with this embezzlement based on a forensic analysis conducted on his computers at the corporate office alongside that of the junior employee. Using different data analytics tools to analyze JLA Enterprise expenditure over the past year revealed several suspicious transactions that had been authorized by the Chief Financial Officer in the last two months (Ojha & Pani, 2020). For instance, it was established that payment to this offshore bank account had increased ten found in the past two months without any clear explanation given in regards to why this development. Interestingly, these payments had been authorized and signed by the CFO, which clearly shows that he had the full knowledge of what was going on. Finally, further analysis of the dates and timing when the invoice and payments to this particular account were made revealed that they had been around the same dates over the two months periods and the time between when the invoice was sent. The payment was made was less than 15 minutes. This was a break from the past where invoices from this same account often took several hours or days before they could be paid. This pattern was an interesting development, but more work had to be done before making any conclusions.
On analyzing the Chief Financial Officer history at JLA Enterprise revealed that he had only been at the organization for five months while the employees suspected to be working with him had been around much longer for about a year. It was also established that the two had been friends for a long time since they had been in college, which represented a red flag in the investigation. The fact that invoices from the suspicious accounts were being made much faster over the past two months than usual, and there had been prior conversations between the CFO and the said employees also represents another red flag. Moreover, this pattern had only begun two months ago, which represents three months since the Chief Financial Officer at JLA Enterprise assumed office.
From this investigation, we can conclude that this Intrusion was an inside job between the Chief Financial Officer at JLA Enterprise, with a junior employee and external player working for an offshore bank account that had to be established through the help of the government and other international investigation bodies. This is because such an investigation will require the involvement of diplomatic relations and more advanced cross-border bank fraud investigation units (Parichha, 2020). As such, this report recommends that further actions and investigations should be taken against the Chief Financial Officer at JLA Enterprise to establish whether this network that was involved in this crime.

References
Mishra, P. (2020). Big data digital forensic and cybersecurity. Big Data Analytics and Computing for Digital Forensic Investigations, 183-203. DOI:10.1201/9781003024743-9
Ojha, A. C., & Pani, S. K. (2020). Data science and big data analytics. Big Data Analytics and Computing for Digital Forensic Investigations, 129-150. DOI:10.1201/9781003024743-6
Parichha, P. K. (2020). undefined. Big Data Analytics and Computing for Digital Forensic Investigations, 1-19. DOI:10.1201/9781003024743-1

Order | Check Discount

Tags: Case Study Forensic Report

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.