What are the main concerns when collecting evidence

Assignment Help Management Information Sys
Reference no: EM132071234 , Length: 2

Assignment Requirements

Ken 7 Windows Limited has decided to form a computer security incident response team (CSIRT). When making any security-related changes, they know the first step is to modify the security policy.

As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. This policy will guide CSIRT team members in developing procedures on proper techniques in handling evidence.

The goal is to ensure all evidence collected during investigations is valid and admissible in court.

You will write a policy to ensure all evidence is collected and handled in a secure and efficient manner. All procedures and guidelines will be designed to fulfill the policy you create.

Answer the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Submission Requirements

Format: Microsoft Word

Font: Times New Roman, 12-Point, Double-Space

Citation Style: APA Style with 3 references

Length: 2-3 pages

Reference no: EM132071234

Questions Cloud

Create new domain of application : How Existing technologies evolve to create "new domain of application"?How to leverage new technology to be on the top as a competitor?
Illustrates the current information system : Your Mobile Ordering Project team needs to provide a summary of your analysis findings to IT leadership and other department stakeholders.
Investigate available cloud computing options : All IT technology and software was fully managed on-premises. However, the practice is adding another location and five new employees.
The difference between mandatory and benchmark practices : What is the difference between mandatory and benchmark practices in physical security?
What are the main concerns when collecting evidence : What are the main concerns when collecting evidence? What precautions are necessary to preserve evidence state?
Devise a plan to assess the current challenges : Read the case study titled "High Quality Healthcare: A Case of Cost and Quality,". Next, devise a plan to assess the current challenges facing the hospital.
Discuss their exertion of one of the sources of power : Select four people currently in the media and discuss their exertion of one of the sources of power.
Discuss your ip addressing scheme : Discuss your IP addressing scheme and whether you implemented subnetting or Classless Inter-Domain Routing (CIDR).
Statements about the feasible region : A linear programming problem has two constraints X + 2Y

Reviews

Write a Review

Management Information Sys Questions & Answers

  Calculate the minimum storage capacity

A speech signal has a total duration of 10 s.- Calculate the minimum storage capacity needed to accommodate this digitized speech signal.

  Analyze why the burden on managers is greater today

Compare the direction of current and past trends in both communication and networking and explain how these changes have impacted business.Analyze why the burden on managers is greater today than in previous years when it comes to using technolog..

  Describe how and where the framework could be applied

Describe how and where the framework could be applied. Include a discussion about how and if the concepts could be applied to a government or public company or is there a potential for overlap.

  Benefits of graphic design in a technical documentdescribe

benefits of graphic design in a technical documentdescribe some of the benefits of utilizing graphic design or visual

  Provide a short introduction of the article

After reading the article, submit a video summarizing the article. Please include the following components in your video:Provide a short introduction of the article to include the main idea(s).Include the purpose of this article.Provide an evaluation..

  What the client-server model is for computer networks

Explain what the client-server model is for computer networks. How does this client-service model benefit the user of the client systems?

  Provide the IT assessment report to the management

You are required to provide the IT assessment report to the management in the department or section that is running the project for Gigantic

  Was anything learned from this disaster

What are your thoughts on the subsequent effects of the spill.Did BP handle the situation well?Was the legal decision proper and fair in your opinion? If not, why not and what should have been the outcome?Was anything learned from this disaster?

  Ethical issues in information systems

Ethical Issues in Information Systems- Choose one (1) ethics issue, You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you

  Identify what might occur in your joint programming effort

Identify what might occur in your joint programming effort if you and your peer could not take advantage of the benefit you highlighted.

  Who responsible for signing off on project closure documents

The objective of Configuration Management is to define and control the service and infrastructure components, and to maintain accurate configuration information. Which of the following are the activities of Configuration Management? Each correct a..

  Analyze data using google trends

This assignment is designed to help the student begin to use and analyze data using Google Trends.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd