Describe the mandatory policies and processes

Assignment Help Computer Network Security
Reference no: EM13756913

Assignment: Forensic Lab Design

Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.

Write a four to five (4-5) page paper in which you:

Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.

Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure.

Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices.

Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized.

Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence.

Design a floor plan for the lab using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13756913

Questions Cloud

How native americans were harmed by european explorers : Two details about how native americans were harmed by European explorers?
The use of dramatic stories became increasingly important : The use of dramatic stories became increasingly important to musical composition during the 19th century and for this week's discussion I would like you to read and briefly compare two famous poems from the time: The Raven, by Edgar Allen Poe & The E..
Minimum wage affects the employment of unskilled labor : Minimum wage legislation requires most firms to pay workers no less than the legislated minimum wage per hour. Using marginal productivity theory, Explain how a change in the minimum wage affects the employment of unskilled labor.
What conditions did african amercians serve in union army : Under what conditions did African amercians serve in the union army during the civil war?
Describe the mandatory policies and processes : Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence
What was john rolfes voyage to the new world : What was John Rolfe's voyage to the New World?
Differences between symmetric and asymmetric encryption : Describe the differences between symmetric and asymmetric encryption. Select the encryption method you believe is typically more reliable of the two and explain why. Determine if there are any situations where the typically less reliable method co..
What came to distinguish priests from the laity : What came to distinguish priests from the laity by about 100?
About attending a college or university lesson : What mental models do you have about attending a college or university lesson? Are these mental models helpful? Could any of these mental models hold you back from achieving the full benefit of the lesson?

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is expected number of bits raw keys agree

phase 1 communication between Alice and Bob. Suppose the raw keys consist of k bits each. What is the expected number of bits on which Alice's and Bob's raw keys agree? Explain your answer.

  Discusses the current state of relating technologies

Discusses the current state of relating technologies and various aspects necessary for a better home network implementation from an ecological point of view.

  Concept of privacy and security

For discussion, noting the extent to which we are connected to the internet, at home, while in class, even in flight, what is your approach to protecting your privacy when online? What measures do you take to safeguard your computer and other devi..

  How the database and web services can be protected

Study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques

  Explain cross-talk and other forms of interference

Cross-talk, and other forms of interference are a significant issue in any communications infrastructure. Compare and contrast how this problem would manifest for analog data transmitted

  Users in your organization are concerned about performance

users in your organization are concerned about performance and network security. after a meeting with your

  Calculate m mod p in rsa cryptosystem

Assume that instead of using composite N = pq in RSA cryptosystem, we simply use prime modulus p. Calculate m mod p. Justify correctness and analyze running time of decryption algorithm.

  Describe a process that would allow alice to send a message

Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption.

  Discuss a minimum of five event types found in a dhcp log

Discuss a minimum of five event types found in a DHCP log and describe what they refer to and what plan will you follow to assign printers to all the users in the organization?

  Leaders and managers

One of business' contemporary rules states that organizations should move away from some top leaders and many managers to leaders at every level and few managers.

  Develop its own mib for managing a product line

Suppose you worked for a Canadian base company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered?

  Intrusion detection system (ids)

concept of Data, information and knowledge in information warfare, politically motivated computer misdeeds, McClintock Manufacturing, Percentage of Windows systems that run antivirus software that is updated each day, network traffic that is evaluate..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd