Develop detailed plan to approach and secure incident scene

Assignment Help Computer Network Security
Reference no: EM13720430

Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance information. The account information extracted is unknown at this time, though it appears as though multiple computers were being used for the crime and it isn't clear whether an attack is currently in progress. The employee has been detained but his computers remain online.

Write a two to three (2-3) page paper in which you:

1. Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario.

2. Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

3. Explicate the importance of creating an order of volatility by identifying the potential evidence that is the most volatile. Explain, in detail, how you would extract this evidence.

4. Identify the high-level steps that would be performed in collecting and analyzing the evidence. Include steps that are required, as well as what should not be done, in order to maintain the potential admissibility of evidence.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Reference no: EM13720430

Questions Cloud

Discuss whether the agm fulfils that role : Explain the intended purpose, or role, of the Annual General Meeting (AGM), and discuss whether the AGM fulfils that role.
Individual versus group incentives : From the e-Activity, compare and contrast the likely success of individual incentives, group incentives, and companywide incentives for improving employee performance.
Find the quantity of required soccer balls : Estimate how many soccer balls it will take to cover the surface of the moon (assume moon is a sphere with a flat terrain). Compare this number to Avogadro's number. What is your conclusion?
Illustration of the plan-do-study-act : Review the illustration of the Plan-Do-Study-Act (PDSA) model on the Institute for Health Care Improvement website. Identify an issue at your work, home, or community that could use improvement.
Develop detailed plan to approach and secure incident scene : Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.
Main obstacle in implementing the two aims : Question 1: What would you consider to be the main obstacle in implementing the two aims your classmates chose? Question 2: What are your recommendations for resolving the obstacle to ensure the aim's success?
Find the hazard index and lifetime carcinogenic risk : Calculate the hazard index and lifetime carcinogenic risk from drinking the water using the EPA default values. Is the risk acceptable?
Explain primary tasks high-level investigation processes : Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.
Describe the marketing mix actions : Describe the marketing mix actions that chobani yogurt has taken since founding in 2005. Organize by product actions, price actions, promotion actions, and place.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe an instance of a file that contain evidence

Describe an instance of a file that contain evidence of its own integrity and authenticity and describe a malware attack that causes the victim to receive physical advertisements.

  Plan a high-level backup and disaster recovery plan

Plan a high-level backup and disaster recovery plan for a business. Discuss the security of the network and suggest best practices for securing the business network.

  Write down a 350- to 700-word article review addressing the

write a 350- to 700-word article review addressing the sequential process the article discusses that highlights a

  Identify and explain how the breach occurred

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  Find the product cipher obtained by using the

1 if the two most common letters in a long ciphertext encrypted by an affine transformation c equiv ap b mod 26 are x

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Prepare a security checklist for new century

You decide to prepare a security checklist for New Century. Prepare a list of security issues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the five security levels.

  A friend is interested in installing a wireless lan in her

a friend is interested in installing a wireless lan in her small business. she has about a dozen employees. she is

  Cryptography and network security

CS 470: Cryptography and Network Security,  Compare the RSA and EIGamal signature schemes' performance in terms of efficiency of the verification operation, ability to pre-compute most of the signature operation in advance.

  The discussion board db is part of the core of online

the discussion board db is part of the core of online learning. classroom discussion in an online environment requires

  What is the single most important new technology

What is the single most important new technology that has affected digital forensics in the last five years and why?

  Organization-severely lacks in appreciating need security

Organization that severely lacks in appreciating the need for security or a company that depends on equipment that is outdated and services from contractors that are low quality? Why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd