Describe how the digital forensics function complements

Assignment Help Basic Computer Science
Reference no: EM13770390

Developing the Corporate Strategy for Information Security

Imagine that you are working for a startup technology organization that has had overnight success. The organization's immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.

As part of the Information Security Strategy development, you are required to define specific Information Technology Security roles that will optimize and secure the organization's data assets.

Review the following Website titled "Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development" for additional information necessary to complete this assignment.

Write a five to seven (5-7) page paper in which you do the following, based on the scenario described below:

1. The Chief Information Security Officer (CISO) is responsible for several functions within an organization.

a. Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the
organization.

b. Specify at least three (3) competencies that the CISO could perform using the provided Website titled, " Information Technology
(IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce
Development."

2. The Chief Information Officer (CIO) is responsible for several accountability functions within an organization:

a. Identify at least four (4) functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these
functions within an organization.

b. Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training,
and educational program.

c. Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an
organization on a day-to-day basis.

3. Describe how the digital forensics function complements the overall security efforts of the organization.

4. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry.

5. List at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations.

6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM13770390

Questions Cloud

What is its nominal interest rate : Suppose that the Canadian economy, on a fixed exchange rate, has a real growth rate of 2% and is in equilibrium with an inflation rate of 10% and risk premium of 1%. Suppose that changes in the US cause its real rate of interest to increase from 3% t..
Present arguments for free trade-arguments for protection : Present the arguments for free trade and the arguments for protection of the US domestic steel industry. Analyze and evaluate the arguments. What policy should we follow in the steel industry and why
Paralegal could use to conduct the research process : Choose two (2) tools that a paralegal could use to conduct the research process. Explain the primary manner in which each of the identified tools enables a paralegal to interpret legal authority
Describe the two proofreading strategies that you used : Describe the two proofreading strategies that you used. Explain which strategy you prefer and why. Explain what the benefits and drawbacks are for each strategy.
Describe how the digital forensics function complements : Describe how the digital forensics function complements the overall security efforts of the organization. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the e..
Analyze the sarbanes-oxley act : Analyze the Sarbanes-Oxley Act, identify at least one (1) weakness, and make a recommendation for addressing that weakness
Examining your community source of energy : It is easy to criticize society for not using renewable resources, but in reality, how difficult would this transition be? What processes and procedures would be involved? How would such a transition be made?
Consider the following risk-free t-bill and coupon bonds : Consider the following risk-free T-bill and coupon bonds available for sale in the bond market (annual coupons): Maturity Price Coupon 1 942 T-bill 2 995 6.3% 3 998 7.5% 4 985.25 6.75% a) Your company plans to issue two-year maturity bonds in year tw..
Pursue to reduce our projected federal deficits and debt : Which of the following options (alone or in combination) would you recommend that the Congress and the President pursue to reduce our projected Federal deficits and debt and why. Dramatically cut military spending. Raise taxes significantly on the we..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  It systems that have affected business

Identify five different IT systems that have affected business in the past few years (i.e., business software applications, networks, hardware, internet-based technologies, databases). For each system, briefly note the following:

  Describe the hardware needed and the size of the network

Create a network for a company that sells shoes. Describe the hardware needed and the size of the network (PAN, LAN, WAN) and make a flow chart or mind map of the network. The description should be at least 500 words. The flow chart or mind map shoul..

  How many bits are required in the logical address

Consider a paging architecture with a logical address space of 256 pages with a 256 byte page size, mapped onto a physical memory of 64 frames. Assume that it takes 50ns to access a memory page, and TLB lookup time is 2ns.

  Assess the ease of use and efficiency of using both windows

evaluate the ease of use and efficiency of using both windows and unix file management systems. of the two file

  Draw the pipeline execution diagram for this code

Draw the pipeline execution diagram for this code, assuming full forwarding is used and the branch is determined in the EX stage. The pipeline always predicts branch taken.

  How long will it take to reach steady-state value

Investigate the effect of the parameter b on y(t). To do this, plot y versus t for several values of b on the same plot. How long will it take for y(t) to reach 98 percent of its steady-state value?

  Use active directory for authentication and authorization

Why would an organization choose to use Active Directory for authentication and authorization over other solutions such as Novell Netware or a free solution such as Linux based LDAP.

  Write recursive method returns true if string palindrom

A palindrome is a word that reads the same backward or forward. For ex- ample, radar, racecar, and level are palindromes.

  Responsibilities of job when designing digital portfolio

Do you think that your digital portfolio should depend on the job, title, or industry you are planning or working on getting into? Do task and responsibilities of a specific job matter when designing your digital portfolio?

  Needs to manage its telecommunications costs more effective

The retail store knows that it needs to manage its telecommunications costs more effectively. Based on the owner's goals to maximize the Internet for this purpose, provide a solution that will support the telecommunications (phone and fax) nee..

  Designing unique game world

Answer the questions listed below under Part A - save your answers into a Word document for submission along with remainder of your assignment. Design your own unique game world, which must exhibit the following characteristics:

  Physical design and implementation

This assignment requires the use of a relational database management system. Strayer University provides each student with a login id to a University maintained Oracle Database Server for you to implement your tables and queries in this course.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd