Digital Forensics Evidence

Acme hospital is in Philadelphia, Pennsylvania, and services approximately 200,000 patients in the area. The Information Security team has discovered that attackers have successfully exfiltrated the patient records of all 200,000 patients. You are a part of the forensic investigation team that is tasked with the discovery and collection of evidence.
Using the scientific method as discussed in your textbook as the foundation, describe the steps in the method.
Discuss specifically what actions related to this scenario you will conduct for each step in the scientific method.

Full Answer Section Draw a conclusion. Based on the analysis of the data, the forensic investigation team will draw a conclusion about whether the attackers gained access to the patient records through a vulnerability in the hospital's IT system. Actions Related to This Scenario State the problem. The forensic investigation team will begin by reviewing the incident report to understand the nature of the data breach. This includes determining the type of data that was exfiltrated, the number of patients affected, and the potential impact on the patients. Form a hypothesis. Based on the information gathered in the previous step, the forensic investigation team will form a hypothesis about how the attackers gained access to the patient records. This hypothesis will be based on the team's knowledge of common attack vectors and the specific vulnerabilities that were identified in the hospital's IT system. Design and conduct an experiment. To test the hypothesis, the forensic investigation team will conduct a number of investigative activities. This may include: Collecting and analyzing logs: The team will collect and analyze logs from the hospital's IT systems to identify any suspicious activity. This may include logs from firewalls, intrusion detection systems, and application servers. Reviewing security policies and procedures: The team will review the hospital's IT security policies and procedures to identify any weaknesses. This may include policies on password management, data encryption, and access control. Interviewing witnesses: The team will interview the hospital's IT staff to learn more about the attack. This may include interviews with system administrators, network engineers, and security analysts. Analyze the data. Once the forensic investigation team has collected all of the relevant data, they will begin to analyze it to identify any patterns or trends. This analysis may involve using specialized tools and software to identify malicious activity and to reconstruct the timeline of the attack. Draw a conclusion. Based on the analysis of the data, the forensic investigation team will draw a conclusion about how the attackers gained access to the patient records. This conclusion will be documented in a report that will be provided to the hospital and to law enforcement, if necessary. The forensic investigation team will also provide recommendations to the hospital on how to improve its IT security posture and to prevent similar attacks from happening in the future.
Sample Answer

Scientific Method Steps

  1. State the problem. The problem in this scenario is that attackers have successfully exfiltrated the patient records of all 200,000 patients at Acme Hospital.

  2. Form a hypothesis. The hypothesis in this scenario is that the attackers gained access to the patient records through a vulnerability in the hospital's IT system.

  3. Design and conduct an experiment. To test the hypothesis, the forensic investigation team can conduct the following experiment:

    1. Review the hospital's IT system logs to identify any suspicious activity.
    2. Analyze the hospital's IT security policies and procedures to identify any weaknesses.
    3. Conduct interviews with the hospital's IT staff to learn more about the attack.
  4. Analyze the data. The forensic investigation team will analyze the data collected from the experiment to determine whether it supports the hypothesis.