Evidence collection policy

Assignment Help Basic Computer Science
Reference no: EM133052992

Evidence Collection Policy

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

 Description of information required for items of evidence

 Documentation required in addition to item details (personnel, description of circumstances, and so on)

 Description of measures required to preserve initial evidence integrity

 Description of measures required to preserve ongoing evidence integrity

 Controls necessary to maintain evidence integrity in storage

 Documentation required to demonstrate evidence integrity

Reference no: EM133052992

Questions Cloud

Describe what a secure score is for in company : Describe what a secure score is for in a company using Azure services. How is the score obtained?
Satellite communication solutions : Some businesses have no alternative but to use satellite communication solutions.
Example visualization or infographic : Select any example visualization or infographic and imagine the contextual factors have changed:
Windows hardening recommendations : As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened.
Evidence collection policy : After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT).
Internship reflection : Did you face any issues related to these tasks and how did you resolve it? You could also mention if you had a personal issue related to work
Cybersecurity-policy-threats and behavior : Is the topic attainable for a first-time dissertation student? Is the problem rooted in the literature? Is there a theoretical model or framework discussed?
What management and technical missteps : After analyzing the incident what management and technical missteps have you identified?
Research most current ways to prevent identity theft : Research the most current ways to prevent identity theft. List the pro's and con's of the one you feel would be the most effective.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Online search for a good or service offered

Online search for a good or service offered in another country

  Compare the concept of friedman globalization

Compare the concept of Friedman's "Globalization 3.0? with Nielsen empowerment stage of the digital divide

  Corporate strategy

What makes Samsung a conglomerate? What type of diversification does Samsung pursue?

  Innovation drives change in educational settings

This journal article was focused on how information and communication innovation drives change in educational settings.

  Information systems and digital privacy

Discusses broad consent under the revised Common Rule. How is this issue related to information systems and digital privacy?

  What value is obtained by adding all six of the m values

The mean (M) and sum of squares (SS) are computed for each cell in the matrix. What value is obtained by adding all six of the M values?

  Calculate the modified duration of the bond

A 5-year bond pays annual coupons of 7%. The annual effective yield on the bond is 4%. Calculate the modified duration of the bond.

  Discuss how the concept of workstation domains figure

Briefly discuss how the concept of workstation domains figure into your organizations security policies, please cite and list your references.

  Describe an ethical conundrum found in a magazine

Describe an ethical conundrum found in a magazine or newspaper article, and please give your own thoughts.

  Explain major components of a data warehouse architecture

Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data

  Program that reads a sequence of integers into an array

Write a program that reads a sequence of integers into an array and that computes the alternating sum of all elements in the array

  Anderson use of gps-based system to monitor

What are the positive and negative aspects of Anderson's use of the GPS-based system to monitor his drivers and sales people?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd