You as an information security professional

Assignment Help Basic Computer Science
Reference no: EM13951140

Assignment 2: Forensic Lab Design

Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.

Write a four to five (4-5) page paper in which you:
1. Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.
2. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure.
3. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices.
4. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized.
5. Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence.
6. Design a floor plan for the lab using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or one of their equivalents such as Open Project Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Describe the purpose and structure of a digital forensics lab.
• Examine and explain the evidence life cycle.
• Describe the constraints on digital forensic investigations.
• Develop a computer forensics deployment plan that addresses and solves a proposed business problem.
• Use technology and information resources to research issues in computer forensics.
• Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

Reference no: EM13951140

Questions Cloud

Security and privacy in the 21st century : Read the following article and describe the issues associated with using social media networks. Then describe privacy and security consequences that might occur, especially when using the social media networks inappropriately.
Use the encase software or digital forensics framework : Compare and contrast systems forensic uses of the military, law enforcement agencies, and private corporations. Determine which of these groups has the greatest need for systems forensics and what issues may arise if adequate forensics operations ..
Indicate how you would measure the variable : Identify and list the variables for analysis required to address the question/problem. For each variable, indicate how you would measure the variable (just list a few typical values, and the maximum and minimum values if the variable is quantitati..
Write a c program that takes an integer argument : Write a C program that takes an integer argument from the command line and outputs the sum of all digits of the integer. For example, the result of the invocation sum of digits 12345 should be 15.
You as an information security professional : Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.
Use of motivation and teamwork : The Chief Financial Officer (CFO) for ABC Construction Inc. has been promoted to the newly created position of Vice President of Operations. The CFO's absence leaves a void in the knowledge base of the owners' group regarding several key operation..
Process of ethical business decision making : Determine the considerations for and process of ethical business decision making to balance corporate and social responsibilities, and address moral, economic, and legal concerns.
Communications manager for international gadgets : As the new communications manager for International Gadgets, you have come across many examples of ineffective communications, including some older directives that were never carried out, mostly because of their unclear nature.
Changing technology and business environments : Rapidly changing technology and business environments might have impacted each generation differently. Do you believe that each generation has similar needs for products or services?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Design and write a application using pseudo code

design and write a application using pseudo code

  Variables does the data frame have

How many variables does the data frame have? How many rows does the data frame contain?

  Define function that takes an argument in name of a csv file

Define a function that takes an argument in the name of a CSV file. This file has a single row containing letter grades (A-F) separated by comma (hence CSV file). Your function should print the distribution of grades.

  Describe the formula for elasticity of demand

O. Describe the formula for elasticity of demand for labor as well as the significance of elastic versus inelastic findings. How does this compare with the elasticity of labor supply? P. What is the labor-leisure trade-off? On figure 8.5, describe t..

  Identify your chosen organization''s significant it challenge

From the e-Activity, identify your chosen organization's significant IT challenges, the Windows Server 2012 edition it chose to meet these challenges, and the most significant operational benefits it derived from this choice. Compare and contrast at ..

  How much extra transmission delay will the segments

a) How much extra transmission delay will the segments experience?

  A method named annualsalary that returns the salary

A method named annualSalary that returns the salary for a whole year

  Write method determines pair integers whether multiple first

Write method multiple that determines, for a pair of integers, whether the second integer is a multiple of the first. The method should take two integer arguments and return true if the second is a multiple of the first and false otherwise.

  What is the future of human-computer interactions

What makes today's technological environment a Digital World? What is the future of human-computer interactions

  National parks database

You have been hired by a local travel agency to set up tours for the coming season to the National Parks in the United States. The travel agency wants to be able to access a database that will let them know about several features of each park so..

  Memory allocation errors

The application should display all daily. Use a user-defined function as handler of memory allocation errors. The user-defined function should be registered as a default handler of new failures temperatures as well as average weekly temperatures in a..

  Exploited both network and host vulnerabilities

Several computers in your company have recently been compromised. It was discovered that your company network had been under attack for several months. However, these attacks had not been previously detected. The attackers exploited both netwo..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd