An information security professional

Assignment Help Basic Computer Science
Reference no: EM13505156

Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.

Write a four to five (4-5) page paper in which you:
1. Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.
2. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure.
3. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices.
4. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized.
5. Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence.
6. Design a floor plan for the lab using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
• Include charts or diagrams created in Visio or one of their equivalents such as Open Project Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Describe the purpose and structure of a digital forensics lab.
  • Examine and explain the evidence life cycle.
  • Describe the constraints on digital forensic investigations.
  • Develop a computer forensics deployment plan that addresses and solves a proposed business problem.
  • Use technology and information resources to research issues in computer forensics.
  • Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

 

Reference no: EM13505156

Questions Cloud

Explain gagnon company quality cost report : Prepare a Quality Cost Report in good form with separate sections for prevention costs, appraisal costs, internal failure costs, and external failure costs.
Compute the mass of the block of ice : A dock worker applies a constant horizontal force of 80.5 N to a block of ice on a smooth horizontal floor. What is the mass of the block of ice
Explain what factor does the reaction rate change : A reaction in which A, B, and C react to form products is zero order in A, one-half order in B, and second order in C. By what factor does the reaction rate change if [A] is doubled (and the other reactant concentrations are held constant)
How much work does your head do on the book : During an etiquette class, you walk slowly and steadily at 0.20 {\rm{ m/s}} for 2.5 {\rm m} with a 0.75 {\rm kg} book balanced on top of your head
An information security professional : Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.
Why babariga acquired the rights to run a quarry : Babariga acquired the rights to run a quarry from a parcel of land owned by Ajonibode. Babariga's accounting year ends on 31 December and payment to Ajonibode is made on the 1 January following the year end.
Define yield of sodium sulfide is obtained : After mixing 2.00g of H2S with 2.00g of NaOH, a 92.0% yield of sodium sulfide is obtained. Calculate the experimental yield in grams obtained in that reaction
Estimate the magnitude of the acceleration of the particle : An 9.00 {\rm kg} point mass and a 15.0 {\rm kg} point mass are held in place 50.0 {\rm cm} apart. Find the magnitude of the acceleration of the particle
Amount of net income reported by espy corp : What was the amount of net income reported by Espy Corp. in 2010 and determine the amounts of any cash inflows or outflows related to the common stock and dividend accounts in 2010.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate the sum of all the elements of firstarray

Calculate the sum of all the elements of FirstArray and put the sum in EAX. Use indirect addressing to access the elements of array.

  Weighted probabilities for x86 processors

Create a procedure that receives a value N between 0 to 100. When the procedure is called, there should be a probability of N/100 that it clears the Zero flag. Write a program that asks the user to enter a probability value 0 to 100.

  Which machine has better performance

Which machine has better performance? By how much? Justify your answers. Instruction Class Cycles needed Instruction Frequency

  How do you print the rightmost element in a binary tree

How do you print the rightmost element in a binary tree?

  How long will it take to reach steady-state value

Investigate the effect of the parameter b on y(t). To do this, plot y versus t for several values of b on the same plot. How long will it take for y(t) to reach 98 percent of its steady-state value?

  What relation between software application process andthread

What is the relation between a software application, process and thread

  What is ldap and what are its security vulnerabilities

Why do you think an organization would continue to use directory services that have known security flaws?

  Every programming language have several commonalities

The basics of every programming language have several commonalities

  Question about artificial intelligence

Artificial intelligence topics include Expert Systems and Genetic Algorithms. Do you think that corporations can really use artificial intelligence to make a good business decision?

  Why is it important to educate users about risks

what is a primary security risk that users should acknowledge when using macros? Why is it important to educate users of these risks once their dilemma is resolved?

  Explain decision support systems

Decision support systems: Modeling and Analysis question - Why are models not used in industry as frequently as they should or could be?

  Decryption algorithm: reverse the encryption algorithm

Decryption algorithm: Reverse the encryption algorithm. The permutation, however, should (circular) shift the bit pattern by 1 bit to the right

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd