Metrics-based risk assessment and management

Assignment Help Basic Computer Science
Reference no: EM132577515

Discussion Question 1. 

The METRICS-BASED Risk Assessment and Management of DIGITAL FORENSICS paper discusses two crucial phases (Appendix A).

The first phase included all the forensics involved with the collection of data, while the second phase concerns defending the data collected.

Discuss the correlation between the two phases to ensure credible conclusions.

Textbook :

Information Governance: Concepts, Strategies and Best Practices; John R.S. Fraser, Betty J. Simkins, Kristina

Narvaez; Copyright © 2015 by John R.S. Fraser, Betty J. Simkins, Kristina Narvaez (ISBN 978-1-118-69196-0)

Discussion response 2.

Digital forensics has two indispensable phases with the first phase detailing all forensics used in collecting data and the second one involves defending the data collected, ways in which data was collected, and the logistics applied from the primary data to the results (A°rnes, 2018). The first phase is crucial because it determines the results obtained after the investigation. The forensics used must be relevant to the issue under study to have valid results. Any wrong forensics can lead to misinformation about the issue under investigation. Today, there is a lot of data in cyberspace that can be used to analyze a situation to come up with well-informed conclusions. However, not all data is relevant to the issue under investigation. That is why phase one is important in digital forensics. The second phase is connected to the first phase because the user data must be analyzed by the appropriate tools to bring out the expected results (Chen, Takabi & Le-Khac, 2019). The means used to collect data should be justifiable and online with the requirements of being authenticated and justified. Not all means of data collection fits all forms of data. For instance, data related to a theft case can be collected from the scene of the crime using video footage recorded by CCTVs but observation may not be applicable in this situation because the incident took place in the past. With these deliberations, it is apparent that the two phases have to be correlated if the desired and accurate results have to be credible. Any mismatch in the two phases can lead to invalid output because they depend on one another.

References

A°rnes, A. (2018). Digital forensics. Hoboken, NJ: John Wiley & Sons Inc.

Chen, L., Takabi, H., & Le-Khac, N.-A. (2019). Security, privacy and digital forensics in the cloud. Hoboken, NJ; Singapore: John Wiley & Sons, Inc.

Discussion response 2

Effective Data Forensic Strategies

Digital forensic involves a comprehensive analysis of data collection strategies targeting and establishing a pattern. It is important to relate different phases in data collection strategies to ensure effective digital forensics processing. The first phase involves establishing a strategic way of data collection to understand how an activity happened as a way of collecting the difference. Data identification is important since it can help in establishing the credibility of the data source and ensure that correct channels are followed during the data collection process. For example, research by Quick and Choo (2016) discussed the application of the scanning process in hard drives to retrieve the files since they can have high forensic values in the forensic analysis. Comprehensive data collection services in a forensic study are the foundation of effective investigation due to the availability of reliable evidence. It is appropriate to ensure that phase one has adequate data to ensure effective evidence analysis.

The second phase involves ensuring that data collection strategies are effective and follow the protocols to stand as evidence in the court. In this case analysis, the results from the data collection process were run by each participant while determining the Initial Repair Cost of Mitigate. It mainly focused on establishing the criticality and the cost involved in the risk assessment process. It made it easy to identify the credibility and potential vulnerabilities in the data collection strategies. Therefore, there was an opportunity to ensure the effective Documentation and Reporting process by eliminating potential vulnerabilities in the data analysis. Hence, the data collection process and validation process are effective in the decision-making process by promoting an effective conclusion. The two phases should show a correlation to ensure enough evidence to support cyber-related cases.

References

Quick, D., & Choo, K. K. R. (2016). Big forensic data reduction: digital forensic images and electronic evidence. Cluster Computing, 19(2), 723-740.

Reference no: EM132577515

Questions Cloud

What is the case background and problem statement : In what ways do you think the narrator effectively communicated the patient safety issue with CEO Jerry Westfall? How could the narrator have improved.
Contingency leadership theories : Developing a leadership strategy to manage remote workers in a way that ensured productivity while also motivating employees, what would you do
Discuss an ethical failure in financial services industry : Discuss an ethical failure in the financial services industry. Did regulation help prevent the full extent of damage? Did regulation result from the actions?
What are the two broad approaches of porter strategy : What are the two broad approaches of Porter's strategy? How are they explained and what examples are given? What are the challenges facing market strategies?
Metrics-based risk assessment and management : The METRICS-BASED Risk Assessment and Management of DIGITAL FORENSICS paper discusses two crucial phases (Appendix A).
Discuss why department participate in prepare own budget : Discuss Why should each department participate in preparing its own budget? How much control do you think each department should have?
Determine target point and resistance points : Carry out your negotiation, then engage in reflective practice. What worked well? What can be improved for future negotiation?
Explain the evolution of modern war : Using Geoffrey Parker's Western Way of War Thesis, which element or elements best explain the evolution of modern war between 1648 and 1941?
Big data analytics : Which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Remove an entry or print an entry given the entry name

To facilitate implementation of the remove and retrieve methods, add a getter method to the Person class to return the key of the object.

  Elway business services

You have been asked by Elway Business Services Inc. to evaluate the possible financial loss that could be accrued by threats to its servers. You decide to use the ALE equation to estimate this cost. As a starting point, EBS provides the follow..

  Decomposition dependency preserving

Is this decomposition dependency preserving? Make sure to justify your answer and to show all details.

  Describing national project

Find an article describing a national project in detail. On the basis of the article and on your understanding of the project,

  What state does the counter go on the next clock pulse

A 4-bit ripple counter consists of flip-flops, which each have a propagation delay from clock to Q output of 15 ns. For the counter to recycle from 1111 to 0000, it takes a total of ________.

  Explain dual signature used in set protocol

Explain dual signature used in SET (Secure Electronic Transfer) protocol and provide example.

  Disaster recovery planning models

In one page, please Compare and Contrast various Business Continuity & Disaster Recovery Planning models.

  Restaurant according to the amount of the bill

Write a script that calculates the tip in a restaurant according to the amount of the bill?- The program should ask about the amount of the bill in dollars- if the bill is less than $10 then the tip is $1.80- if it is between $10 and $60 the tip i..

  What is data mining and what is text mining

What are the business costs or risks of poof data quality? What is data mining? What is text mining

  What are some additional performance metrics of interest

Suppose you have two systems. System #1 processes jobs at rate 100 jobs/sec and system #2 at a rate 150 jobs/sec. What is the speed-up and relative change of system #1 with respect to system #2?

  The availability and multitude of forensic toolkits

the availability and multitude of forensic toolkits continue to increase. the last decade has witnessed the emergence

  End-user development of it applications

What are some of the risks of end-user development of IT applications?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd