I have another assignment

User Generated

elnawnzrf

Computer Science

Description

this is the Forensics Plan Guide you will need.
http://digital-forensics.sans.org/community/papers/gcfa/safe-home_283

assignment is in file

Unit 5 Application.docx 

Unformatted Attachment Preview

Unit 5 Application: Data Leakages and Countermeasures In this Application, you identify data leakages and necessary countermeasures to close security gaps as part of an incident response. You also prepare some of the investigation reports for the business sector you chose as part of your Group Project. Consider this scenario: An employee within your business's human resources department noted that when she came to work this morning, the front door of the department area was open, and several of the computers were turned on. Standard practice for this department, which handles sensitive employee information and organizational data, is to lock its doors and turn off its computers at night. At this point, no one is sure if a security breach has taken place, but these computers provide access to personal and private data, and everyone wants to know whether a breach has occurred. As the person responsible for forensic investigations in your organization, your job is to determine what has happened and to document your findings. You must document your findings and present them at a preliminary investigation meeting (PIM). Compose a unique incident and investigation review document to address the incident described above. Include a brief (1–2 paragraphs) executive summary of the report and a detailed incident and investigation review. For your review, follow the instructions in the "Forensics Plan Guide," Sections 1.1– 1.9 (pages 5–7 of the document). Use the template provided in the guide following the index (copy and paste or recreate the template in a word processor) and fill in the required information for each of the following sections: •1.1 Determine the intent and scope of the investigation •1.2 Determine legal restrictions •1.3 Determine the limits of the investigator's authority •1.4 Determine what the client wants from the investigation •1.5 Determine resource availability •1.6 Determine the escalation procedures •1.7 Determine liaison and reporting requirements •1.8 Document known facts and initial incident time-line
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags