TASK 3: Email Forensics

by Nurul Shabilla Shaherra binti Muhammad Asri Tan (Cd17058)

a) Correlate the motive, the activity and the effect to outline which act will the charge fall into.  Decide the act he should be referred to if he was at Malaysia, and identify the most punishment can he be convicted to.

Act of hacking, or, in technical words, illegal access to computer material, whether or not with the aim to conduct a subsequent crime and spreading of computer viruses, or, in technical terms, modification of the contents of any computer.

The punishments, depending on the type of offence committed, ranges from a fine of RM25,000 to RM150,000, or imprisonment of 3 to 10 years, or both.

b) Let say you are the assigned forensics analyst for this case. Construct the investigation steps on how should you investigate this case when you are dealing with the encrypted evidence file sent by the malware.

  1. The investigator seeks to answer the following questions:
    • Who was involved?
    • What did the malware occur?
    • When did the malware occur?
    • Where did the malware occur?
    • How did the malware occur?
  2. Collection
    • collect the digital devices that potentially hold digital evidence, and spans multiple digital devices, systems and servers. Collecting volatile data can alter the memory content of digital devices and data within them.
  3. Acquisition
    • The entire acquisition process should be documented. This documentation should include detailed information about the digital devices from which evidence was extracted, the hardware and software used to acquire the evidence, the manner in which the evidence was acquired, when it was obtained, where it was obtained, why it was obtained, what evidence was obtained, and for what reason it was obtained. 
  4. Preservation
  5. Analysis and Reporting

Reflection

Artifacts

Ahmad, R. (2019, November 29). Malaysia also hit by WannaCry ransomware. The Star. https://www.thestar.com.my/news/nation/2017/05/14/malaysia-also-hit-by-wannacry-ransomware/.

Basics of Cyber Security Law in Malaysia. Chia, Lee & Associates. (2021, April 8). https://chialee.com.my/basics-of-cyber-security-law-in-malaysia/.

Fruhlinger, J. (2018, August 30). What is WannaCry ransomware, how does it infect, and who was responsible? CSO Online. https://www.csoonline.com/article/3227906/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html.

Hani. (2017, May 22). More Ransomware Cases Detected In Malaysia; Unreported Cases Likely. The Malaysian Reserve. https://themalaysianreserve.com/2017/05/18/more-ransomware-cases-detected-in-malaysia-unreported-cases-likely/.

RASHVINJEET S. BEDI and ADRIAN CHAN. (2019, November 29). WannaCry strikes two Malaysian companies. The Star. https://www.thestar.com.my/news/nation/2017/05/16/wannacry-strikes-two-msian-companies-expert-first-organisation-infected-last-saturday/.

Leave a comment

Design a site like this with WordPress.com
Get started