Access Millions of academic & study documents

Cyber Intelligence

Content type
User Generated
Subject
Computer Science
School
Florida State University
Type
Homework
Showing Page:
1/5
Running head: CYBER INTELLIGENCE 1
Cyber Intelligence
Student’s Name:
Institution Affiliation:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
CYBER INTELLIGENCE 2
Introduction
In the contemporary world, technology has significantly advanced, and organizations
have embraced various measures to control the amount of data being inter-exchanged.
Organizations embrace different systems to secure their data and information, thereby making it
possible to prevent loss of data through employees. Most organizations store data, information,
or images in digital format (Varol & Sönmez, 2017). This has increased cases of criminal
activities via computers used by employees to access restricted files. It has become paramount
for organizations to enforce laws that prevent employees from violating access controls. In this
assessment, the primary purpose is to perform a comprehensive forensic analysis plan to help
corporate clients mitigate an issue regarding employees accessing images that are strictly
prohibited based on the Terms of Use. Typically, forensic analysis involves a detailed
investigation to detect and document the impacts of security issues or violations of Terms of Use.
In the forensic analysis, phase 1, phase 2, and phase 3 will address the issue.
Phase 1: Identification and Preparation
Mainly, this is the first step in forensic analysis that the organization will use to mitigate
the issue. The primary objective of this phase to determine how the ICS operates. In this phase,
the organization will determine whether the information available is adequate to proceed with the
forensic investigation (Varol & Sönmez, 2017). The organization will ensure that the employees'
system works properly to prove that the alleged violations were committed.
It would be important for the organization to duplicate the forensic data to ensure it has
integral value and that the Terms of Use are enforced through the standard law as the
organization creates a forensic image. Moreover, this phase involves the seizing of data to ensure
the organization obtains the original evidence. During identification, the organization will

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running head: CYBER INTELLIGENCE Cyber Intelligence Student’s Name: Institution Affiliation: 1 CYBER INTELLIGENCE 2 Introduction In the contemporary world, technology has significantly advanced, and organizations have embraced various measures to control the amount of data being inter-exchanged. Organizations embrace different systems to secure their data and information, thereby making it possible to prevent loss of data through employees. Most organizations store data, information, or images in digital format (Varol & Sönmez, 2017). This has increased cases of criminal activities via computers used by employees to access restricted files. It has become paramount for organizations to enforce laws that prevent employees from violating access controls. In this assessment, the primary purpose is to perform a comprehensive forensic analysis plan to help corporate clients mitigate an issue regarding employees accessing images that are strictly prohibited based on the Terms of Use. Typically, forensic analysis involves a detailed investigation to detect and document the impacts of security issues or violations of Terms of Use. In the forensic analysis, phase 1, phase 2, and phase 3 will address the issue. Phase 1: Identification and Preparation Mainly, this is the first step in forensic analysis that the organization will use to mitigate the issue. The primary objective of this phase to determine how the ICS operates. In this phase, the organization will determine whethe ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4