Metrics-based risk assessment and management

Assignment Help Basic Computer Science
Reference no: EM132577515

Discussion Question 1. 

The METRICS-BASED Risk Assessment and Management of DIGITAL FORENSICS paper discusses two crucial phases (Appendix A).

The first phase included all the forensics involved with the collection of data, while the second phase concerns defending the data collected.

Discuss the correlation between the two phases to ensure credible conclusions.

Textbook :

Information Governance: Concepts, Strategies and Best Practices; John R.S. Fraser, Betty J. Simkins, Kristina

Narvaez; Copyright © 2015 by John R.S. Fraser, Betty J. Simkins, Kristina Narvaez (ISBN 978-1-118-69196-0)

Discussion response 2.

Digital forensics has two indispensable phases with the first phase detailing all forensics used in collecting data and the second one involves defending the data collected, ways in which data was collected, and the logistics applied from the primary data to the results (A°rnes, 2018). The first phase is crucial because it determines the results obtained after the investigation. The forensics used must be relevant to the issue under study to have valid results. Any wrong forensics can lead to misinformation about the issue under investigation. Today, there is a lot of data in cyberspace that can be used to analyze a situation to come up with well-informed conclusions. However, not all data is relevant to the issue under investigation. That is why phase one is important in digital forensics. The second phase is connected to the first phase because the user data must be analyzed by the appropriate tools to bring out the expected results (Chen, Takabi & Le-Khac, 2019). The means used to collect data should be justifiable and online with the requirements of being authenticated and justified. Not all means of data collection fits all forms of data. For instance, data related to a theft case can be collected from the scene of the crime using video footage recorded by CCTVs but observation may not be applicable in this situation because the incident took place in the past. With these deliberations, it is apparent that the two phases have to be correlated if the desired and accurate results have to be credible. Any mismatch in the two phases can lead to invalid output because they depend on one another.

References

A°rnes, A. (2018). Digital forensics. Hoboken, NJ: John Wiley & Sons Inc.

Chen, L., Takabi, H., & Le-Khac, N.-A. (2019). Security, privacy and digital forensics in the cloud. Hoboken, NJ; Singapore: John Wiley & Sons, Inc.

Discussion response 2

Effective Data Forensic Strategies

Digital forensic involves a comprehensive analysis of data collection strategies targeting and establishing a pattern. It is important to relate different phases in data collection strategies to ensure effective digital forensics processing. The first phase involves establishing a strategic way of data collection to understand how an activity happened as a way of collecting the difference. Data identification is important since it can help in establishing the credibility of the data source and ensure that correct channels are followed during the data collection process. For example, research by Quick and Choo (2016) discussed the application of the scanning process in hard drives to retrieve the files since they can have high forensic values in the forensic analysis. Comprehensive data collection services in a forensic study are the foundation of effective investigation due to the availability of reliable evidence. It is appropriate to ensure that phase one has adequate data to ensure effective evidence analysis.

The second phase involves ensuring that data collection strategies are effective and follow the protocols to stand as evidence in the court. In this case analysis, the results from the data collection process were run by each participant while determining the Initial Repair Cost of Mitigate. It mainly focused on establishing the criticality and the cost involved in the risk assessment process. It made it easy to identify the credibility and potential vulnerabilities in the data collection strategies. Therefore, there was an opportunity to ensure the effective Documentation and Reporting process by eliminating potential vulnerabilities in the data analysis. Hence, the data collection process and validation process are effective in the decision-making process by promoting an effective conclusion. The two phases should show a correlation to ensure enough evidence to support cyber-related cases.

References

Quick, D., & Choo, K. K. R. (2016). Big forensic data reduction: digital forensic images and electronic evidence. Cluster Computing, 19(2), 723-740.

Reference no: EM132577515

Questions Cloud

What is the case background and problem statement : In what ways do you think the narrator effectively communicated the patient safety issue with CEO Jerry Westfall? How could the narrator have improved.
Contingency leadership theories : Developing a leadership strategy to manage remote workers in a way that ensured productivity while also motivating employees, what would you do
Discuss an ethical failure in financial services industry : Discuss an ethical failure in the financial services industry. Did regulation help prevent the full extent of damage? Did regulation result from the actions?
What are the two broad approaches of porter strategy : What are the two broad approaches of Porter's strategy? How are they explained and what examples are given? What are the challenges facing market strategies?
Metrics-based risk assessment and management : The METRICS-BASED Risk Assessment and Management of DIGITAL FORENSICS paper discusses two crucial phases (Appendix A).
Discuss why department participate in prepare own budget : Discuss Why should each department participate in preparing its own budget? How much control do you think each department should have?
Determine target point and resistance points : Carry out your negotiation, then engage in reflective practice. What worked well? What can be improved for future negotiation?
Explain the evolution of modern war : Using Geoffrey Parker's Western Way of War Thesis, which element or elements best explain the evolution of modern war between 1648 and 1941?
Big data analytics : Which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd