Develop detailed plan to approach and secure incident scene

Assignment Help Computer Network Security
Reference no: EM13720430

Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance information. The account information extracted is unknown at this time, though it appears as though multiple computers were being used for the crime and it isn't clear whether an attack is currently in progress. The employee has been detained but his computers remain online.

Write a two to three (2-3) page paper in which you:

1. Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario.

2. Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

3. Explicate the importance of creating an order of volatility by identifying the potential evidence that is the most volatile. Explain, in detail, how you would extract this evidence.

4. Identify the high-level steps that would be performed in collecting and analyzing the evidence. Include steps that are required, as well as what should not be done, in order to maintain the potential admissibility of evidence.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Reference no: EM13720430

Questions Cloud

Discuss whether the agm fulfils that role : Explain the intended purpose, or role, of the Annual General Meeting (AGM), and discuss whether the AGM fulfils that role.
Individual versus group incentives : From the e-Activity, compare and contrast the likely success of individual incentives, group incentives, and companywide incentives for improving employee performance.
Find the quantity of required soccer balls : Estimate how many soccer balls it will take to cover the surface of the moon (assume moon is a sphere with a flat terrain). Compare this number to Avogadro's number. What is your conclusion?
Illustration of the plan-do-study-act : Review the illustration of the Plan-Do-Study-Act (PDSA) model on the Institute for Health Care Improvement website. Identify an issue at your work, home, or community that could use improvement.
Develop detailed plan to approach and secure incident scene : Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.
Main obstacle in implementing the two aims : Question 1: What would you consider to be the main obstacle in implementing the two aims your classmates chose? Question 2: What are your recommendations for resolving the obstacle to ensure the aim's success?
Find the hazard index and lifetime carcinogenic risk : Calculate the hazard index and lifetime carcinogenic risk from drinking the water using the EPA default values. Is the risk acceptable?
Explain primary tasks high-level investigation processes : Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.
Describe the marketing mix actions : Describe the marketing mix actions that chobani yogurt has taken since founding in 2005. Organize by product actions, price actions, promotion actions, and place.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Des operating on a general plaintext input

DES operating on a general plaintext input 1st with key K1 and then with key K2 manufactures the same output as if K2 were first used and then K1.

  Which of the cia goals did tjx fail to achieve in attack

Research the TJX data breach case on the web and answer the following questions.

  Identify the virus software running on your computer

Explain the origin and effects of at least 3 different types of viruses/malicious programs as well as how your computer can become vulnerable to these threats.

  Create class to maintain personal budget for a year

Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum.

  An isp has received a block

An ISP has received a block of addresses in which the prefix length (n = 24). The ISP needs to make 8 sub-nets (sub-blocks) of equal sizes from this block. What is the prefix of each sub-block?

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  How much information is available to potential hackers

Maintaining a proactive approach on security requires that an organization perform its own hacking footprinting to see how much information is available to potential hackers

  Discuss limitations, omissions,or technical flaws

An abstract where you state what you have done, what is the contribution of the paper to the literature and what is the significance of that contribution (200-300 words).

  In what aspects could the tool be improved

What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?

  What is a honeypot

How has honeypots been used in the field of national security?

  Gamal signature schemes

Prove that the equation yaab mod p = gm mod p holds for the signature values chosen by Equation 1, 2 and 3].

  Abc institute of research has sensitive information that

abc institute of research has sensitive information that needs to be protected from its rivals. the institute has

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd