Determine what is needed for the investigation

Assignment Help Computer Network Security
Reference no: EM132034893

Project: Investigation Considerations

A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

2.2: Locate and access sufficient information to investigate the issue or problem.

3.3: Lead and/or participate in a diverse group to accomplish projects and assignments.

4.4: Demonstrate best practices in organizing a digital forensic investigation.

4.5: Utilize Project Management principles in an investigation.

A digital forensic investigation process can involve many steps and procedures. The objective is to obtain unbiased information in a verifiable manner using accepted forensic practices. In this project you will perform some of the steps necessary for setting up an investigation. These steps include designing interview questions that establish the needs of the case and focus your investigative efforts. You will also determine what resources may be needed to conduct the investigation. Once you have this information, you will be able to develop an investigation plan that properly sequences activities and processes allowing you to develop time estimates and contingency plans should you encounter challenges in the investigation.

This particular situation involves two computers and a thumb drive. After clear authorization to proceed has been obtained, one of the first investigative decision points is whether to process the items of evidence individually or together. Processing computers individually makes sense when they are not likely tied to the same case. However, if the computers are linked to the same case, there can be advantages in processing them together.

There are four steps in this project. In Step 1, you will develop interview protocols and identify documentation needs for a forensic investigation. In Step 2, you will identify resources needed for the investigation. In Step 3, you will develop a plan for conducting the investigation, and in Step 4, you will consolidate your efforts in the form of a single document to be submitted to your supervisor (i.e., your instructor). The final assignment in this project is a planning document with a title page, table of contents, and distinct section for each of the three steps in the project

Let's get started! In Step 1 you use an interview template to record questions, keywords, and authorization information, and to complete the legal forms that will be needed in this case. Before you can do that, you need to review your training in criminal investigations.

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

- 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
- 2.2: Locate and access sufficient information to investigate the issue or problem.
- 4.1: Lead and/or participate in a diverse group to accomplish projects and assignments.
- 10.1: Demonstrate best practices in organizing a digital forensic investigation.
- 10.2: Utilize Project Management principles in an investigation.

- Step 1: Complete Preliminary Work

- In Step 1 you recall your training in criminal investigations, in which you covered the laws governing chain of custody, search warrants, subpoenas, jurisdiction,and the plain view doctrine. You also review forensic laws and regulations that relate to cybercrime, as well as rules of digital forensics in preparation for your digital forensic investigation. Next, you read the police report and perform a quick inventory of devices that are thought to contain evidence of the crime. You have set up a meeting with the lead detectives and the prosecutor handling the case.

- You have received an official request for assistance which provides you with authority to conduct the investigation. You realize it will be impossible to produce a detailed investigation project plan prior to your meeting with the detectives and the prosecutor. First you need to develop a series of questions to establish the key people and activities. These questions should address potential criminal activity, timelines, and people who need to be investigated.

- It is also important to determine whether different aspects of the case are being pursued by other investigators and to include those investigators on your contact list. In addition, some situations may involve organizations or individuals who need to adhere to various types of industry compliance. This situation may require you to follow special procedures.

- Your tasks in Step 1 are to create an interview form to record questions, keywords, and authorization information, and to designate the legal forms that will be needed in this case. The forms that you complete as part of Step 1 will be included in your "Investigation Project Plan"-- the final assignment for this project.

- In Step 2 you will consider the types of resources needed for the investigation.

- Step 2: Determine What Is Needed for the Investigation
- In Step 1 you developed the forms and templates needed to collect the legal, criminal, and technical information that lays the groundwork for your investigation. In Step 2, you consider the types of resources needed to conduct the investigation. By making these preparations, you are establishing forensic readiness. Required resources can include people; tools and technologies such as RAID disks, deployment kits, or imaging programs; and budget and timeline information. Develop your checklist. It will be included in your final "Investigation Project Plan." In Step 3 you will prepare a plan for managing a digital forensic investigation.

- Step 3: Develop a Plan

- In the prior step, you determined what resources would be necessary for your investigation. In Step 3 you develop a plan for managing the investigation. Reporting requirementsreflect the step-by-step rigidity of the criminal investigation process itself. Being able to articulate time, task, money, and personnel requirements is essential.

- Project management is a skill set that is not often linked to digital forensics and criminal investigations. That is unfortunate because effective project management can have a dramatic impact on the success and accuracy of an investigation. Identifying the tasks that need to be performed, their sequence, and their duration are important considerations, especially in the face of "wild cards" such as delays in obtaining correct search warrants and subpoenas. It is also important to have a clear understanding of the goals for the investigation as you will likely be called upon to present conclusions and opinions of your findings.

- Your project plan should include properly sequenced evidence acquisition and investigation processes, time estimates, and contingency plans. Your plan will serve many purposes including the assignment of a project budget. As you create your plan, be sure to include communications and reporting-who should be involved, how the activities should be carried out, how often, and under what circumstances (i.e., modality, frequency).

- Once you have developed your project management plan, move on to Step 4 where you will submit your final assignment.

Step 4: Submit Completed Investigation Project Plan

For your final assignment, you will combine the results of the previous three steps into a single planning document-an "Investigation Project Plan"-with a title page, a table of contents, and a distinct section for each of the three steps. The Plan should include:

1. Forms documenting key people, key activities, timeline, keywords, authorization (ownership, jurisdiction), and related investigations. Designation of the Llegal forms required for criminal investigations should also be included. (Step 1)

2. Resource list (Step 2)

3. Management plan (Step 3)

All sources of information must be appropriately referenced. Submit your completed "Investigation Project Plan" to your supervisor (your instructor) for evaluation upon completion.

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.
- 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
- 2.2: Locate and access sufficient information to investigate the issue or problem.
- 4.1: Lead and/or participate in a diverse group to accomplish projects and assignments.
- 10.1: Demonstrate best practices in organizing a digital forensic investigation.
- 10.2: Utilize Project Management principles in an investigation.

Attachment:- PROJECT INSTRUCTION.rar

Reference no: EM132034893

Questions Cloud

What is the length of the longest side ade : The smallest side ADE is 390 what is the length of the longest side ADE?
Population parameters with a very small margin of error : A professor conducted a statistical study in which he was unable to measure any sample? statistics, but he succeeded in determining the population parameters
Calculate your monthly payments for the next eight years : Two years ago you signed a mortgage loan contract with a re-payment schedule of 10-year fixed-rate, at 5.0 percent interest.
How the different contracting approaches differ in terms : Discuss the criticisms that have been made of public agencies performing construction services by the self-performance or force account method.
Determine what is needed for the investigation : Develop interview protocols and identify documentation needs for a forensic investigation - Demonstrate best practices in organizing a digital forensic
Do you agree or disagree with the research : Discuss current research that links patient safety outcomes to Associate Degree in Nursing (ADN) and Bachelor of Science in Nursing (BSN) nurses.
Gram serving of prime rib how many whole packages : 150 people, each person should receive a 200 gram serving of prime rib How many whole packages of prime rib should the caterer order
What services are covered by the given rate : Research the different nursing care facilities in your community. Discuss the pros and cons of the facility in terms of what they offer.
Solve what minimum perfect of data falls : Standard Deviation is $4. How do I use Chebyshev's theorem to solve what minimum perfect of data falls between $20 and $40?

Reviews

urv2034893

10/6/2018 12:42:44 AM

There were no missing parts to this document. It was done according to the step-by-step instruction. All the forms templates, list, checklist, timelines etc were there. What was delivered was a plan, What was asked for was a description of a plan. This thoughtfulness impressed the tutor. all the competencies which the instructor was going to use to evaluate the work were followed up while preparing the assignment. A good practice you have used each competency as a self-check to confirm you have incorporated all of them in your work. The assignment was perfect in every way. Thanks to your experts!!

inf2034893

7/19/2018 4:14:57 AM

Here is some step 1 Information 29551592_1Authorization to Collect Evidence.doc templates, list, checklist, timelines etc... Investigation Project Plan"—with a title page, a table of contents, and a distinct section for each of the three steps. In Step 1 you developed the forms and templates needed to collect the legal, criminal, and technical information that lays the groundwork for your investigation and to create an interview form to record questions, keywords, and authorization information, and to designate the legal forms that will be needed in this case. It will be included in your “Investigation Project Plan”-- the final assignment for this project. Resource list, budget, timeline information and checklist. It will be included in your final "Investigation Project Plan." Management plan

inf2034893

7/19/2018 4:06:50 AM

This is the Instruction about what is expected in the Project. It has steps 1-4. 29551572_1CST 640 PROJECT 1 INSTRUCTION.docx

len2034893

6/29/2018 5:21:08 AM

I want the expert that completed this Ticket ID:E01ROD610CNS to complete this project. Review the competencies below, which will use to evaluate my work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work. 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment. 2.2: Locate and access sufficient information to investigate the issue or problem. 4.1: Lead and/or participate in a diverse group to accomplish projects and assignments. 10.1: Demonstrate best practices in organizing a digital forensic investigation. 10.2: Utilize Project Management principles in an investigation.

Write a Review

Computer Network Security Questions & Answers

  Discuss about the digital signatures

Determine two (2) types of organizations that should not use digital signatures and add them to your post.

  How integer overflow attack works

How integer overflow attack works, and how attack string it uses is designed. Experiment with implementing this attack against suitably vulnerable test program.

  Find typical detection rate for popular anti-virus software

CP5603:03-ADVANCED E-SECURITY ASSIGNMENT. Anti-virus software is popular for Microsoft Windows. Find the typical detection rate for popular anti-virus software

  Explain what you learned about security from the video

Explain what you learned about security from the video and why you selected this particular video. Would you recommend this video to others? You should include any key points or issues raised.

  Describe the sarbanes-oxley act

Describe the Sarbanes-Oxley (SOX) act and Committee of Sponsoring Organizations (COSO) framework - describe the process of performing effective information technology audits and general controls.

  Perform a wireless and remote connectivity assessment

Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal.

  What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

  Analyze security requirements and prepare a security policy

Analyze security requirements and prepare a security policy.

  What safeguards would you take to protect your login

What safeguards would you take to protect your login information, and what policies would you follow. Justify your choices.

  Discuss initial steps you would take for the investigation

Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

  Explain the new threat of ransomware to the organization

The security manager of your organization has approached you to explain the new threat of ransomware to the organization.

  Illustrate interface that organizational users will utilize

Create three to five screen layouts that illustrate the interface that organizational users will utilize. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd