Data Paper

Words: 2748
Pages: 11

Scenario: You are the chief information security officer (CISO) for the VL Bank based in Atlanta, Georgia. Recently, a highly sophisticated and cleverly orchestrated crime was brought to your attention by the information security analysts in your department and by a growing number of business customers.

Your company’s commercial customers utilize a digital certificate multifactor authentication process to access wire transfers, cash management, deposit operations, and account management applications common to all business customers. The problem is that several customers have reported that new user accounts have been set up under their names without their authorization and these accounts are initiating.

The main term used in risk

This digital and Security evidence will be collated via the CISO , It will concentrate on following information:

1-list of affected customers including information about their computers: IP address, operating System version, Anti Virus software , Security software , type of computer personal or pubic .

2-list of fraudulent funds transfers including details about banks inside and outside US ,IP address of the source who made the transfer , Dates and times .

VL Bank’s lawyer and will concentrate on this information, which will be used to highlight from where the transfers in question were made. One of the difficulties of this particular case concerns now the multiple locations to which funds have been transferred as the majority all now exist in international bank accounts across Europe and the Far East.

The relevant banking and criminal authorities there will be contacted and VL Bank will work within each jurisdiction to validate the circumstances surrounding each of the affected transfers.

It is conceivable that the digital evidence collated shows the requests originating from machines that are not situated in any of the locations where the funds have now been deposited but in any event requests will be made to each financial institution holding the transferred funds to disclose, via their legal teams and local enforcement agencies the identities and information concerning the account holders.

For those funds which have