What are main concerns when collecting evidence

Assignment Help Basic Computer Science
Reference no: EM133062062

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

- Description of information required for items of evidence

- Documentation required in addition to item details (personnel, description of circumstances, and so on)

- Description of measures required to preserve initial evidence integrity

- Description of measures required to preserve ongoing evidence integrity

- Controls necessary to maintain evidence integrity in storage

- Documentation required to demonstrate evidence integrity

Reference no: EM133062062

Questions Cloud

Empowering organization to achieve ultimate vision : Risk management is one of the most important components in empowering an organization to achieve its ultimate vision.
Tighter security and ensuring business continuity : Web server auditing can go a long way in enforcing tighter security and ensuring business continuity.
Product idea and search engines-electronic marketing : Describe the product/service including the benefits of using the product/service. Discuss the potential customers for this product/service.
Apply security controls to allow safe : Would an organization need to apply security controls to allow safe use of those applications? Why or why not?
What are main concerns when collecting evidence : What are the main concerns when collecting evidence? Description of information required for items of evidence.
What e-commerce related supply chain strategies : What e-commerce related supply chain strategies have been deployed? How have these decisions potentially affected customer satisfaction for the organization?
Ducati versus harley-davidson : Compare and contrast Ducati's e-commerce strategies with those of Harley-Davidson. What were differences in typical customers of Ducati versus Harley-Davidson
Business Case Analysis : Select a business or industry that has experienced the phenomena of channel conflict as a result of new e-commerce initiatives.
Maturity stages and performance dimensions : Definition of maturity stages and dimension variables in the CEO Technology Best Practices Arc. Define each of the maturity stages and performance dimensions.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is triple encryption

What are the essential ingredients of a symmetric cipher? What are the two basic functions used in encryption algorithms? What is triple encryption?

  Reciprocal of some other rational number

Question: Translate the following English sentences into statements of predicate calculus that contain double quantifiers and explain whether it is a true statement. a. Every rational number is the reciprocal of some other rational number.

  Different terminologies and information governance

Define and relate these different terminologies and Information Governance (IG), Data Governance (DG) and Information Technology Governance (ITG)

  Draw a 16 input sorter

Let "10 10 11 10 00 11 10 00" be your input. Draw a 16 input sorter that uses the divide-and-conquer idea of MergeSort. Show the values on each wire at intermediate steps (i.e. output after a half cleaner of 16 inputs).

  Crime prevention through environmental design

Crime Prevention Through Environmental Design (CPTED) is a major concept in physical security. Find at least one scholarly article on CPTED

  How long will the tournament be in this case

What is the total number of "court-hours" available? How many total hours are courts being used? How many total court-hours are unused?

  Considering range of potential annotation features

Also, considering the range of potential annotation features, what would you do differently or additionally?

  Declare the global array variables

//Add statements to declare the global array variables

  Find the second solution to the four-queens problem

Continue the backtracking search for a solution to the four-queens problem, which was started in this section, to find the second solution to the problem.

  Managing and analyzing data

Managing and analyzing data have always offered the greatest benefits for business organizations of all sizes and across the globe.

  Modify this pay calculator design

Modify this Pay Calculator design to include an input validation loop to ensure that the user provides a valid employee name (non empty); otherwise, the pay is not calculated

  Draw graphs for question separately

Draw graphs for each question separately. (a) National Income decreases. (b) The Federal Reserves decides to increase banks Reserve Requirements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd