How do you ensure evidence remains in its initial state

Assignment Help Management Information Sys
Reference no: EM132078172

Ken 7 Windows Limited has decided to form a computer security incident response team (CSIRT). When making any security-related changes, they know the first step is to modify the security policy.

As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling.

This policy will guide CSIRT team members in developing procedures on proper techniques in handling evidence. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

You will write a policy to ensure all evidence is collected and handled in a secure and efficient manner. All procedures and guidelines will be designed to fulfill the policy you create.

Answer the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Submission Requirements

Format: Microsoft Word

Font: Times New Roman, 12-Point, Double-Space

Citation Style: APA Style with 3 references

Length: 2-3 pages

Reference no: EM132078172

Questions Cloud

The script for a play : How is "The Script for a Play" or "Roles/Parts in a Play" in theater in exhibited in the organizational life?
Find and classify the critical points of f : Find and classify the critical points of f(x)=x?3??(2-x)?4?? as local maxima and local minima. Give the values of x in the order of increasing.
How change that you predict will impact public health policy : In Week 1, (history of surveillance) you write a analyzing the influence that specific historical events have had in the evolution of disease surveillance.
After starting to turn significant profit : After starting to turn significant profit, Lumyn Electronics decided that an investment account for their future expansion plans is now necessary.
How do you ensure evidence remains in its initial state : As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling.
Why did organic valley need an enterprise system : What factors contributed to the successful implementation and outcomes? Explain their importance - Why did Organic Valley need an enterprise system
How would you build a csirt : How would you build a CSIRT? What are the components to building an effective team?
Which of the following is less than 0 : Suppose sin(x)=-0.54. If x is an angle between 1/2p and 3/2p , then what must the value of x be? (State your answer in radians to at least two decimals of accu
Discuss the challenges that incident handlers face : Discuss the challenges that incident handlers face in identifying incidents when resources have been moved to a cloud environment.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Why does symmetric cryptography work best for applications

Description of algorithms that implement symmetric cryptography and strengths / weaknesses of each algorithm.

  Determine the cost of the migration

Share your finding and recommendation either it is a good to migrate to the new systems or need to have old system. Justify your response.

  Discuss strategic issues in planning a model by prioritizing

Discuss strategic issues in planning a model by prioritizing issues facing a community when dealing with a natural disaster.

  Locate an article or section from a credible publication

To prepare for this Discussion, locate an article or section from a credible publication, health resource or website that relates to one of the following topics:Electronic Medical Records (EMRs),Electronic Health Records (EHRs),Personal Health Reco..

  Describe briefly the software package called pgp

State four reasons why physical security is needed. Discuss briefly the benefits and limitations of asymmetric key encryption. Explain briefly the fivesteps undertaken in risk analysis.Describe the procedure involved in automatic password cracking al..

  Analyze vendors who compete in the hit software

Analyze vendors who compete in the HIT software marketplace using the Independent Physician Office Ambulatory EMR Scenario.

  Explain electronic medical record systems

What management, organization, and technology factors are responsible for the difficulties in building electronic medical record systems? Explain your answer.

  Summarize the project requirements and other assumptions

Summarize the project requirements and other assumptions (e.g., budget, human resources, workload, environmental dependencies, etc.).

  Analyze the important principles and practices

Analyze the important principles and practices that are driving the current trends in software development that you researched.

  Evaluate the process of system development life cycle

evaluate the process of system development life cycle sdlcfind the process of system development life cycle sdlc.

  Dividends or stock appreciation

Describe why certain shareholders would have a preference on receiving dividends and on the amount of the dividend. If you were a shareholder of Apple, what would you prefer: dividends or stock appreciation? Please explain your reasons.

  Identify current trend in technology for improving business

Review "Telecommunications and Networking in Today's Business," of Management Information Systems. Identify a current trend in technology for improving global business that is likely to impact a global business within the next 3 years

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd