Describe the business process or set of procedures

Assignment Help Computer Engineering
Reference no: EM132090925

Question: Throughout this course, you will be working on developing several components of either the computer forensics or incident response report you identified from Unit 1. Additional information and the deliverables for each Individual Project will be provided in the assignment description for this project.

With several sections already in place, in this Individual Project you are asked to continue development of the identified sections below that will be included in the computer forensics or incident response report that you will submit to your instructor who is acting as your forensics team lead. This will be an incremental project delivered each week, with new sections to be added each week and updates made in response to instructor feedback.

This step will be to build on your project from Unit 1. You will now start building out the sections of your computer forensics report.

• Nontrivial: The selected business process or set of procedures should reflect a real-life application.

• Domain knowledge: You will apply knowledge of this process or set of procedures to determine the contents of the manual.

Assignment: After selection of the scenario, you will add content to each section of your document to gradually complete the final project deliverable in Unit 5.

The project deliverables are as follows:

Computer Forensics:

1. Complete the following section in bold as identified from your Computer Forensics template (in MS Word format):

i. Update the table of contents (autogenerated)

• Separate page

• Maximum of 2 levels deep

• Fields updated so that the TOC it is up-to-date before submitting your project

• TOC should represent all 4 sections from Executive Summary to the Glossary and Appendix A

ii. Complete Section 2.2 Evidence Assessment

• 1-1.5 pages of content

iii. Place "TBD" (To Be Determined) next to each section title that is not being populated yet.

iv. Include all sections of the report every week, either completed as directed and with TBDs if not tasked yet based on the assignment requirements.

2. Name the document "yourname_ITDI373_IP2.doc."

3. Submit the document for grading.

Incident Response:

1. Complete the following sections as identified from your Incident Response template (in MS Word format):

i. Update the table of contents (autogenerated)

• Separate page

• Maximum of 2 levels deep

• Fields updated so that the TOC it is up-to-date before submitting your project

• TOC should represent all 4 sections from Executive Summary to the Glossary and Appendix A

ii. Complete Section 3 Impact of Incident

• Description must be 150-200 words

iii. Complete Section 4 Sensitivity of Affected Data/Information

• Description must be 150-200 words

iv. Place "TBD" (To Be Determined) next to each section title that is not being populated yet.

v. Include all sections of the report every week, either completed as directed or with TBDs if not tasked yet based on the assignment requirements.

2. Name the document "yourname_ITDI373_IP2.doc."

3. Submit the document for grading.

Reference no: EM132090925

Questions Cloud

State the legal significance and impact to investigations : Discuss the impact of at least 3 of the following legal entities, and state the legal significance and impact to investigations of all 3.
Effect on bias and variance of your model : What would be the effect on bias and variance of your model if you include an additional predictor Xp+1, assuming that Y and Xp+1 are independent?
Paper for a machine learning conference : Jacob is writing a paper for a machine learning conference. He has invented a "new" version of random forests: to grow each tree of the random forest
Works in ?nancial investment company : Your friend who works in ?nancial investment company comes to you with a problem. She is interested in estimating some parameter a from her data
Describe the business process or set of procedures : Throughout this course, you will be working on developing several components of either the computer forensics or incident response report you identified.
Bagging with b bootstrapped training sets : Suppose we ?t a decision tree using bagging with B bootstrapped training sets. For each of the following
Adopt the avoiding style for addressing practically : Many people tend to adopt the avoiding style for addressing practically all conflicts in their lives.
Discuss the importance of global marketing : Discuss the importance of global marketing. Explain how the Internet is affecting global marketing.
Relation between a? male age and hdl? : If I wanted to determine whether there is a relation between a? male's age and his HDL? (so-called good) cholesterol. I randomly selected 17 of his patients

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd