Describe the mandatory policies and processes

Assignment Help Computer Network Security
Reference no: EM13756913

Assignment: Forensic Lab Design

Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.

Write a four to five (4-5) page paper in which you:

Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.

Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure.

Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices.

Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized.

Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence.

Design a floor plan for the lab using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13756913

Questions Cloud

How native americans were harmed by european explorers : Two details about how native americans were harmed by European explorers?
The use of dramatic stories became increasingly important : The use of dramatic stories became increasingly important to musical composition during the 19th century and for this week's discussion I would like you to read and briefly compare two famous poems from the time: The Raven, by Edgar Allen Poe & The E..
Minimum wage affects the employment of unskilled labor : Minimum wage legislation requires most firms to pay workers no less than the legislated minimum wage per hour. Using marginal productivity theory, Explain how a change in the minimum wage affects the employment of unskilled labor.
What conditions did african amercians serve in union army : Under what conditions did African amercians serve in the union army during the civil war?
Describe the mandatory policies and processes : Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence
What was john rolfes voyage to the new world : What was John Rolfe's voyage to the New World?
Differences between symmetric and asymmetric encryption : Describe the differences between symmetric and asymmetric encryption. Select the encryption method you believe is typically more reliable of the two and explain why. Determine if there are any situations where the typically less reliable method co..
What came to distinguish priests from the laity : What came to distinguish priests from the laity by about 100?
About attending a college or university lesson : What mental models do you have about attending a college or university lesson? Are these mental models helpful? Could any of these mental models hold you back from achieving the full benefit of the lesson?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Computing the value of shared secret key

You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Create a communication medium

Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them.

  Explain the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues and make a list of access points internal and external (remote) and design a secure authentication technology and network security for GFI.

  Explain why shared accounts is considered bad practice

In your own words, explain why each of the following is considered bad practice:

  The performance of a wimax network appears to be lower than

the performance of a wimax network appears to be lower than expected and you suspect interference to be the cause.

  The message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted

the message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted using a shift transformation c equiv p k mod 26. use

  Research on personally identifiable information

Learn to correctly use the tools and techniques within Word to format a research paper including using Word 2010/2013's citation tools. These skills will be valuable throughout students' academic career. The paper will require a title page, NO a..

  Management issues of computer security

What are the major defensive mechanisms that can be used to stop such attacks-Pick up one mechanism and comment on it - Management issues of computer security

  Design a remote access control policy for richman

Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for using the selected access controls for systems, applications, and data acc..

  INFA 640 Cryptology and data protection

INFA 640,  Cryptology and data protection  Roberta, the daughter of Bob and Alice, is a summer intern at Encrypt-It-Rite, Inc. For her summer project, Roberta would like to implement a stream cipher using public key encryption. Is this a viable ide..

  Application you are a network administrator in net ambit

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  What would be a successful cybersecurity policy

Write an essay on the topic, "Building and implementing a successful cybersecurity policy". The following questions should be covered in the essay: What would be a successful cybersecurity policy

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd