You as an information security professional

Assignment Help Basic Computer Science
Reference no: EM13951140

Assignment 2: Forensic Lab Design

Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.

Write a four to five (4-5) page paper in which you:
1. Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.
2. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure.
3. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices.
4. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized.
5. Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence.
6. Design a floor plan for the lab using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or one of their equivalents such as Open Project Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Describe the purpose and structure of a digital forensics lab.
• Examine and explain the evidence life cycle.
• Describe the constraints on digital forensic investigations.
• Develop a computer forensics deployment plan that addresses and solves a proposed business problem.
• Use technology and information resources to research issues in computer forensics.
• Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

Reference no: EM13951140

Questions Cloud

Security and privacy in the 21st century : Read the following article and describe the issues associated with using social media networks. Then describe privacy and security consequences that might occur, especially when using the social media networks inappropriately.
Use the encase software or digital forensics framework : Compare and contrast systems forensic uses of the military, law enforcement agencies, and private corporations. Determine which of these groups has the greatest need for systems forensics and what issues may arise if adequate forensics operations ..
Indicate how you would measure the variable : Identify and list the variables for analysis required to address the question/problem. For each variable, indicate how you would measure the variable (just list a few typical values, and the maximum and minimum values if the variable is quantitati..
Write a c program that takes an integer argument : Write a C program that takes an integer argument from the command line and outputs the sum of all digits of the integer. For example, the result of the invocation sum of digits 12345 should be 15.
You as an information security professional : Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.
Use of motivation and teamwork : The Chief Financial Officer (CFO) for ABC Construction Inc. has been promoted to the newly created position of Vice President of Operations. The CFO's absence leaves a void in the knowledge base of the owners' group regarding several key operation..
Process of ethical business decision making : Determine the considerations for and process of ethical business decision making to balance corporate and social responsibilities, and address moral, economic, and legal concerns.
Communications manager for international gadgets : As the new communications manager for International Gadgets, you have come across many examples of ineffective communications, including some older directives that were never carried out, mostly because of their unclear nature.
Changing technology and business environments : Rapidly changing technology and business environments might have impacted each generation differently. Do you believe that each generation has similar needs for products or services?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The set binary divisible by 4 when interpreted as an integer

The set of binary strings which are divisible by 4 when interpreted as an integer value

  Research paper proposal

As you are exploring different ideas for your paper, note the research paper will require you to submit 8-10 double-spaced, typed pages regarding a topic identified in the textbook or another topic relative to this course.

  Explain modern technology now embrace some technologies

Ten years ago there were still organizations that did not rely upon computer technology. These included small businesses that still took cash or checks and were not set up to handle credit or debit cards.

  Database development

Recommend at least three (3) specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Include a thorough description of each activity per each phase.

  The concepts of legal writing

In this assignment, we will attemptto utilize some of the concepts of legal writing that we will discuss in class.Below you will find an essay that, to put it mildly, needs a bit of work. Thewording is verbose and uses “slang”. There is no focus or o..

  How many bits are required in the logical address

Consider a paging architecture with a logical address space of 256 pages with a 256 byte page size, mapped onto a physical memory of 64 frames. Assume that it takes 50ns to access a memory page, and TLB lookup time is 2ns.

  Companion viruses are an increasing problem

Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measures for a firm to take to protect itself from this? Is full protection feasible? Why or why not?

  The information security officer at a medium-sized company

The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities. Explain to your CIO what you can do to make sure the network infrastructure is more secure.

  Identify people to interview to learn new training activity

Draft a project scope statement for the TIMS system and describe the constraints. She said be specific. Need to identify the people want to interview to learn more about the new training activity, and prepare a list of the questions I will ask.

  Currently using common data exchange and data management

•Identify at least two (2) industries that are currently using common data exchange and data management trends. Rank the success of each implementation based on the ease of implementation, ease of use, and costs.

  A complex and highly sophisticated computer worm

In June 2010, Stuxnet, a complex and highly sophisticated computer worm was discovered by Kaspersky Lab. Stuxnet targeted Siemens industrial Supervisory Control and Data Acquisition (SCADA) systems. It was reported that the worm appeared to target Ir..

  Explain the different usability data-gathering techniques

Explain the different usability data-gathering techniques

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd