Describe and analyze practices in obtaining digital evidence

Assignment Help Management Information Sys
Reference no: EM13949810

Case Study: Attacking More Than Just the Enterprise

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

Read the article titled, "Verizon DBIR 2012: Automated large-scale attacks taking down SMBs" located at the following Search Security link: https://searchsecurity.techtarget.com.au/news/2240147412/Verizon-DBIR-2012-Automated-large-scale-attacks-taking-down-SMBs.

Write a three to four (3-4) page paper in which you:

Evaluate the recent trend toward attacking small and medium businesses and identify the benefits that these types of businesses have which attract attackers.

Compare and contrast the digital forensic operations of small-sized companies to large companies in terms of costs, personnel, inexperience, naivety, etc.

Explain the common purpose of attacks on point-of-sale (POS) systems and identify why you as a security professional would have cause for concern for your customers' POS systems.

Assess why and how these POS systems have become a prime target for hacking groups.

Examine the forensics challenges that exist for investigations on POS systems.

Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Outline system forensics issues, laws, and skills.

Describe and analyze practices in obtaining digital evidence.

Use technology and information resources to research advanced issues in computer forensics.

Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

Verified Expert

Reference no: EM13949810

Questions Cloud

What level of concurrency is best supported by mimd computer : Could someone please explain to me what are the three levels of concurrency in programs?
Problem regarding the work and heat transfer : Carbon dioxide (CO2) as an ideal gas executes a Carnot power cycle while operating between thermal reservoirs at 450 and 1008F. The pressures at the initial and final states of the isothermal expansion are 400 and 200 lbf/in.2, respectively. The s..
How to solve the query containing string : There's only 26 orders and 4 customers named Smith. Yet I get 104 rows as a result?
Describe and analyze practices in obtaining digital evidence : Describe and analyze practices in obtaining digital evidence - Examine the forensics challenges that exist for investigations on POS systems.
Maximum and minimum temperatures : Two kilograms of air within a piston-cylinder assembly execute a Carnot power cycle with maximum and minimum temperatures of 750 K and 300 K, respectively. The heat transfer to the air during the isothermal expansion is 60 kJ. At the end of the is..
Piston-cylinder assembly execute a carnot power cycle : One and one-half pounds of water within a piston-cylinder assembly execute a Carnot power cycle. During isothermal expansion, the water is heated at 5008F from saturated liquid to saturated vapor. The vapor then expands adiabatically to a temperat..
Constant-diameter heating duct operating : Air enters a horizontal, constant-diameter heating duct operating at steady state at 290 K, 1 bar, with a volumetric flow rate of 0.25 m3/s, and exits at 325 K, 0.95 bar. The flow area is 0.04 m2. Assuming the ideal gas model with k 5 1.4 for the ..
Provide commentary on the differences between the two system : Provide a brief commentary on the differences between the two systems for each situation, addressing the possible advantages of the activity-based view over the functional-based view.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Using the research topic does the united states benefit

using the research topic does the united states benefit from the world trade organization?1. locate a related reference

  Is processes and cost alignmentwhat are some of the reasons

is processes and cost alignmentwhat are some of the reasons that organizations adopt a charge back process for is

  Show the use of tablets vs. desktops

Show the Use of Tablets Vs. Desktops and Justify your thoughts on whether tablets will replace desktop computers and offer an opinion why Apple desktop sales have grown.

  Rfp for active directory redesign at initech inc

RFP for Active Directory Redesign at Initech, Inc. Initech is a financial software developer that provides software and services to half of the Fortune 500. The organization currently has four major offices located in Austin, Detroit, Seattle, and ..

  Advantages and disadvantages of customized software

Advantages & Disadvantages of customized software - Show What are the advantages and disadvantages of customized software?

  Why new technology often disruptive for existing it systems

Why is new technology often disruptive for existing IT systems? What things can be done to prepare these systems for future technology ahead of time

  Public relations campaign and technologyan organization is

public relations campaign and technologyan organization is planning to introduce a new product in another country. what

  What is the supply chain-wide technology strategy

What is the supply chain-wide technology strategy that supports multiple levels of decision making and describe the clear view of the flow of products, services, and information.

  Define the term stickiness as used in electronic commerce

Define the term "stickiness" as used in electronic commerce. In one or two paragraphs, explain why it is important for advertising-supported Web sites to have this characteristic.

  Population have high-speed broadband connections

Other Services Resulting From High Speed Broadband - What other services will change business models when large parts of the population have high-speed broadband connections?

  Types of security threats to it

Information Security : explained - Access controls are good things and should be secure, but programmers continually add "backdoor access" to their programs. Is a good or a bad practice?

  Turning sustainability shortcomings

Identify ways in which it may expand upon current or past sustainability successes and Identify opportunities for turning sustainability shortcomings into areas of sustainability growth.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd