What is cyber forensic explain with a case study?

GDF supported attorneys, private investigators and US Marshalls on a civil seizure. The client’s intellectual property, in this case garments, were being counterfeited and sold throughout the United States. GDF supported the seizure team by locating additional locations during the seizure, as well as gathering digital evidence onsite, eliminating the need to remove and return […]

read this

  • Case Type: Intellectual Property
  • Environment: Large Network, International WAN
  • Industry: Manufacturing/Wholesale
  • Additional: Quantity of Data - Large E-Mail Server (Notes), CRM System (Customer Relationship Management) Database, PeopleSoft Task – Work with counsel on Discovery Requests, Depositions, 30(b)6 and data correlation, coding and link analysis.

Scenario Two employees and a manager left a large chemical manufacturing company with offices and facilities in New York, New Jersey, Texas, China and Argentina. The two employees and the manager had emailed a customer contact database, invoicing information, financial data and proprietary information to their home computer in an attempt to steal intellectual property. […]

read this

  • Case Type: Prescription Drug Diversion, Anti- Counterfeit, Brand Protection, International – Computer Forensics
  • Environment: On-Site Seizure at Several Locations Throughout the United States and Canada.
  • Industry: Pharmaceutical
  • Additional: Systems Involved – Desktops, Laptops, E-mail, Handheld Devices and Email

Case Background A Pharmaceutical Company began receiving complaints from its representatives in certain geographical areas that sales of normally high volume drugs were slowing down considerably. The companies internal security department as well as the security departments of its major distributors began an investigation. The results of the investigations led the security professionals to believe […]

read this

  • Case Type: Intellectual Property Protection (Seizure), Anti- Counterfeiting, Brand Protection, Product Diversion
  • Environment: On-Site Seizure at Several Locations Throughout NY, NJ and CA.
  • Industry: Consumer Healthcare Products
  • Additional: Systems Involved – Desktops, Servers (Linux, Win2003), Email Server (Exchange), Remote Offices connected through VPN Firewall.

Case Background A manufacturer of consumer healthcare products began receiving complaints on their consumer information line. The complaints regarded a variation in taste and texture of several products purchased at a discount chain. The consumers complained that the product they purchased was unusable, watery and smelled tainted. The company, through a Private Investigator in New […]

read this

  • Case Type: Digital Forensics
  • Environment: Complex Multi-Location Network, Desktop, Network
  • Industry: Banking

Scenario A large accounting firm was hired to audit certain activities related to loans to individuals on the Board of Directors of a medium size, publicly traded bank (the “Bank”). During the Audit, the auditors needed to examine several computer systems used by certain Bank employees as well as by certain Board Members. GDF’s digital […]

read this

  • Case Type: Electronic Data Discovery
  • Environment: Legacy and Updated Mainframe System
  • Industry: Financial
  • Additional: Quantity of Data - Greater than 12 Terabytes (millions of transactions and documents) Task – Define a methodology of extracting statistically relevant sample data from a live, extremely high processing system based on IBM IMS mainframes. The task was two fold. Prove a flaw in the system that created errors which financially damaged the class, and to extract random samples of data that satisfied both sides in order to quantify damages

Scenario A NYC law firm handling a class action was faced with 2 Terabytes of electronic financial data, millions of documents and emails as well source code that ran on a legacy mainframe system. The data was supplied raw and no access was granted to the live system. The attorneys were faced with trying sort […]

read this

  • Case Type: Securities Fraud
  • Environment: Complex, Desktop, Raw Transaction Data, E-Mail
  • Industry: Financial Serives
  • Additional: A massive stock fraud operation - the company lied to customers, fabricating and manipulating hundreds of securities.

Scenario A massive stock fraud operation with offices on Wall Street and in Florida lied to its customers and fabricated and manipulated hundreds of securities. The enterprise was pursued by a few government agencies including the Securities & Exchange commission, the National Association of Securities Dealers Regulation, and the NY District Attorney's Office along with […]

read this

  • Case Type: Financial Fraud
  • Environment: Mainframe, Network
  • Industry: Financial
  • Additional: Quantity of Data – Terabytes Task – Work with counsel on Discovery Requests, Depositions, 30(b)6 and data correlation, coding and quantification of damages.

Quantity of Data – Terabytes Case Study – Digital Forensics Task – Work with counsel on Discovery Requests, Depositions, 30(b)6 and data correlation, coding and quantification of damages. Scenario A large publicly traded financial institution, with its principal offices in the North East contacted GDF investigators for assistance in finding multiple possible instances of fraud. […]

read this

  • Case Type: Internal Corporate Fraud
  • Environment: Complex Multi-Location Network and Desktops
  • Industry: Banking

Scenario A large accounting firm was hired to audit certain activities by officers of a medium size, publicly traded bank (the “Bank”). During the investigation, the auditors needed to examine several computer systems used by certain Bank employees. GDF’s digital forensic examiners were immediately dispatched and sent in to arrange for the formal investigation of […]

read this

  • Case Type: Insurance Industry Regulation
  • Environment: Complex Mainframe, Desktop, Raw Transaction Data, Email
  • Industry: Insurance

Scenario A State Regulator was in the middle of an extensive examination of an insurance company that fell under its jurisdiction. The insurance company was suspected of engaging in certain activities that may have been in violation of certain state and federal regulatory guidelines. The insurance regulators had been working on the examination for a […]

What is cyber forensics with examples?

The science of collecting, inspecting, interpreting, reporting, and presenting computer-related electronic evidence is known as cyber forensics. Evidence can be found on the hard drive or in deleted files.

What is cyber forensics?

Computer forensics is a field of technology that uses investigative techniques to identify and store evidence from a computer device. Often, computer forensics is used to uncover evidence that could be used in a court of law.

What are the cyber forensics steps explain in detail?

The Digital Forensic Process First, investigators find evidence on electronic devices and save the data to a safe drive. Then, they analyze and document the information. Once it's ready, they give the digital evidence to police to help solve a crime or present it in court to help convict a criminal.

What is cyber forensic explain any three needs of cyber forensic?

Cyber Forensics is needed for the investigation of crime and law enforcement. There are cases like hacking and denial of service (DOS) attacks where the computer system is the crime scene. The proof of the crime will be present in the computer system. The proofs can be browsing history, emails, documents, etc.