Secure the incident scene

Assignment Help Computer Network Security
Reference no: EM13755970

Assignment: Securing the Scene

Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance information. The account information extracted is unknown at this time, though it appears as though multiple computers were being used for the crime and it isn't clear whether an attack is currently in progress. The employee has been detained but his computers remain online.

Write a two to three (2-3) page paper in which you:

Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario.

Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

Explicate the importance of creating an order of volatility by identifying the potential evidence that is the most volatile. Explain, in detail, how you would extract this evidence.

Identify the high-level steps that would be performed in collecting and analyzing the evidence. Include steps that are required, as well as what should not be done, in order to maintain the potential admissibility of evidence.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13755970

Questions Cloud

Risk of auditee use of data mining : Write a Report on the risk of auditee's use of data mining and how that affects the use of data mining. The Report should not exceed 3 pages, and contain a cover and reference page (which do not count towards the 3-page maximum).
Discussion-hiring for success : At this point in the course you should be well armed with the tools and knowledge necessary to make better-informed and rational choices. Apply that knowledge as you tackle one of the most important, and yet heavily subjective, of management respo..
Identify most sold bread type : Part 1. Identify most sold bread type Part 2. Determine which bread gives you most revenue
Explain the populist and pro-silver movements of the 1880s : Were the Populist and pro-silver movements of the 1880s and 1890s essentially backward-looking protests by a passing rural America.
Secure the incident scene : Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario
Compare the business models and areas of apple : Compare the business models and areas of Apple, Google, and Microsoft
Examine common web application vulnerabilities and attacks : Examine three common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your response.
Create a matrix that lists each business : The businesses are being sued for breach of contract. Create a matrix that lists each business, and compare and contrast your personal liability exposure as an owner as a result of the lawsuit
When did the government break the first amendment : When did the government break the first amendment?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  How does it affect performance and security

Sector level hard disk encryption is one of the most interesting problems of all. Assume that AES-128 is used to encrypt your local hard disk. What mode will you use? CBC or ECB?

  Security threats to mobile devices and counter measures

Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, applications of the technologies, clarify vague areas and research questions.

  Digital stratigraphy

concept of Message Digest, File Carving, MD5, Locard's Exchange, Parker's categories, computer-related crime as suggested by Donn Parker, computer systems as sources of digital evidence

  Email viruses are typically launched by people

Email viruses are typically launched by people who modify header information to hide their identity. Brightmail's Enrique Salem says that in the future

  You work as a network administrator for a college located

you work as a network administrator for a college located in your local city. next door to the college is a new gated

  Peer entity authentication security service

Draw a matrix similar to the table presented in class that shows the relationship between security services and attacks - Peer entity authentication security service

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  What is the purpose of the diffie-hellman algorithm

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  Analyze ings solution for providing security to determine

write a three to four page paper in which youassess the probable difficulties and risks associated with using a public

  Aid in hacking into computer networks

what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against worms, viruses, DoS attacks, spyware, and other such network intrusions that can disrupt the ..

  Determine the legal and ethical considerations

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd