Description
Assignment 1
As an IT manager, you are an organizational leader. What is the best way to take the results from an event involving digital forensics and use that knowledge gained in the investigation to improve your organization’s IT Risk processes in order to reduce IT risks? Your response should avoid scare tactics and fcus on the ethical need to address issues in a way that encourages compliance with the new security measures.
This assignment must follow the APA format. The target word length for the content is 2,000 words, which will generally be about five double-spaced pages. The title page and reference pages do not count to this word limit. Leverage at least three scholarly resources for this paper.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached. Please let me know if you have any questions or need revisions.
Outline
Topic- computer science Question
The following has been covered in this paper
✓ An IT manager is responsible for executing and maintaining an organization's technology
infrastructure. The organization depends on a central information processing structure to
support well-organized data management and coordination. The IT manager monitors the
company's operational needs, research strategies, and technology solutions and generates
the most cost-friendly and efficient scheme to achieve that objectives.IT manager is also
an organizational leader in such that he can influence his employees to ensure the
organization thrives. He possesses the quality of anticipation also has the intelligence of
setting directions and making plans in detail.
✓ Digital forensics consists of techniques that deal with investigation and searching digital
evidence. It's a forensic science division that involves identifying, gathering, preserving,
investigating, and presenting digital information. It aims at reconstructing the series of
activities that happens in crime scene (Casey,2009). Digital data and media can be
improved from digital devices like phones, laptops, and many more. Digital forensics is
the procedure of investigation of digital data gathered from many digital sources
✓ There are two types of a digital forensics' investigation. A public investigation is an
examination done against the suspected individuals to detect a crime scene. Overall the
administration agencies handle such kind of investigations that relates to public sectors.
The investigation is conducted under criminal investigation procedures since they are
dealt with as a criminal act. A private examination is done from crime about businesses,
organizations, or offices. Any infringement of policies or terms of the private sector falls
in this category of investigation.
✓ The investigation procedure in digital forensic is a step by step process done by experts.
In Information technology, managers are involved in ensuring original evidence isn't
destroyed in the process as they are transferred in the form of data or images from one
medium to another.
✓ The significance of events like incident response plotting and digital forensics are
essential to an organization that works in sensible security sectors. The best cybersecurity
practices are considered valuable to all organizations. If a security incident happened, the
IT managers would be expected to respond and investigate so that they are prepared to
follow structured, valuable, and informed procedures (Selamat, et al. 2008). In any digital
forensic investigation, once interact with the surrounding, it changes, and the evidence is
altered. It is essential to comprehend what activity people have done and work from that
point. As the IT manager, one should be prepared to remove false positives. Disapproving
truth with evidence is equivalent to effective as proving a model during the examination.
✓ Big data forensic investigations are possible to cause a high risk of the right to privacy. It
is the leading risk that organizations face when it comes to digital forensics examination.
The data breach also happens in most cases where the system is attacked to damage the
data. The manager's role here is to ensure that the data is restored. Encryption is the
process of scrambling the information. It is one of the issues Information technology can
face during a digital forensic investigation. The data are decoded and accessed by
permitted people who can decrypt the encrypted information (Lillis, et al. 2016).
✓ Some security measures can be employed in an organization. Application of biometrics
will ensure that authentication, face access control, and precise worker monitoring are
done, hence preening risks. The organization should also try to have a written policy that
serves as a guideline for all its measures. It will allow the security experts and workers to
be on a similar page and offer a way to impose regulations that protects data. Since the
organization owns unique and hidden risks, it is essential to aim at compliance and to
meet all rules to protect sensitive information (Levin, 2021).
✓ It is obvious to encounter issues in information technology. As the manager, one should
encourage his subordinates that it's regular, but they should try to prevent them as much
as possible. First, accept that the issue has happened and don't blame any compliance for
the happening. The impact of cost and effort of managing the issue is more than the
impact of the problem itself. Monitoring the risk is the best tactic if you identify a threat
that can be ordered through the risk event is far o...