preview

Summary: HCC Partners In Life Potential Breach

Decent Essays

Final Exam: HCC Partners in Life Potential Breach Introduction
Planning processing of a potential incident scene As lead forensic investigator for XYZ, Inc., my first task in planning to process the potential crime/incident scene at HCC Partners in Life, is how to collect computers involved in the incident scene methodically and thoroughly. First and foremost, I would attempt to ascertain the type of case I am investigating. In this instance, I know that there is a possible breach in the medical records system at HCC. I would need to talk to employees involved in the incident and ask questions. For instance, I would need to know if police (and hopefully not their Information Technology (IT) department) taken custody of any computers, …show more content…

The checklist will be dual purposed. It will be beneficial in listing the steps or fashioning the framework of the overall steps needed to examine the HCC breach as well as keeping the team’s analysis systematic and on track. For example, because HCC is a private sector business, we need to reach a hypothesis as to whether any computer misuse was possibly perpetrated by an HCC employee or by a customer. Bearing in mind that there is still a need to maintain customer confidentiality, “the Homeland Security Act and Patriot Act of 2001 have redefined [in turn, allowing]… ISPs and other communication companies now can investigate customers’ activities that are deemed to create an emergency situation” (Nelson, Phillips, & Steuart, 2010). However, this incident did not seemingly involve an emergency situation, that is, an incident involving “immediate risk of death or personal injury” (Nelson, Phillips, & Steuart, 2010), for instance, a bomb …show more content…

WFT is intended to afford an organized and repetitive mechanized Live Forensic Response, Incident Response, or audit on a Windows system simultaneously gathering information germane to system security (Security, 1999-2014). According to the website’s developer, Full Moon Software & Security and in my past experience, WFT is helpful in my observing any precursors to the incident, a cyberattack, to verify that an attack actually occurred or to check for computer mismanagement or alterations in its configuration (Security,

Get Access