What is the purpose of digital forensics

Assignment Help Management Information Sys
Reference no: EM133495949

Assignment: Social Media and Digital Environments Paper

In today's world, the ever-changing social media and digital environments require professionals to have a solid foundation in law and ethics. As a future InfoSec professional, it will be required of you. Your role will be critical in helping to control the organization's liability for privacy and security risks.

Prior to beginning this assignment, view the video "2-1 Introduction to Topic 2," located in the topic Resources.

In a 1,500 to 1,750 words summary, address each item below to demonstrate how one would build a reliable, ethical, and legal information system that businesses and consumers can trust.

Part 1

As the computer forensics industry is growing, consider how the methods for handling computer crimes differ from traditional methods. Make sure to address the following:

Question 1. What is the purpose of digital forensics?

Question 2. Explain why it is important for any organization to sustain a permanent digital forensics team.

Question 3. In digital forensics, must all investigations follow the same basic methodology? Justify your rationale and explain the steps involved in this methodology.

Question 4. Concerning digital forensics, list the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data. Note: This information can be presented in a table or chart.

Question 5. Examine the U.S. federal laws and legal issues associated with cyber threats, especially cyber types such as fraud and financial cybercrimes.

Question 6. Using the organization you selected in Topic 1, discuss the legal rights of the organization to perform forensic investigations on personal mobile devices that are part of your BYOD policy.

Part 2

In many situations, multiple levels of government must work in partnership when ensuring security compliance. As a cybersecurity professional, research the following:

Question 1. Describe the federal, state, and local cyber defense partners/structures.

Question 2. Examine the laws, regulations, and standards that organizations use to align with government requirements around cybersecurity best practices within their industry.

Question 3. Explain federal laws and authorities, including the Computer Security Act, Sarbanes - Oxley, Gramm - Leach - Bliley, Privacy (COPPA) HIPAA / FERPA, USA Patriot Act, Americans with Disabilities Act, Section 508, and other Federal laws and regulations.

Part 3

For each scenario, identify the applicable law(s) it would fall under and describe how the type of legal dispute (civil, criminal, or private) affects the evidence used to resolve it. Note: This information can be presented in a table.

1. Transmission of underage photographs to various email addresses in California, Arizona, and Colorado
2. Colonial Pipeline Hack
3. Victim's identity used to open a new account
4. Bank fraud/scam
5. A firm's credit card records are stolen

Part 4

When providing information assurance, a sound defense strategy does not only look at the legal aspects but also the ethical abuses of abilities on the job.

Question 1. There are three main categories of unethical behavior that organizations must seek to minimize: ignorance, accident, and intent. From your research and your professional/personal experience, provide examples of each category and best practices for how to prevent such activities from happening.

Question 2. What happens when a job task borders on unethical from your personal viewpoint? Is your response to the issue any different than what you discussed above? What behaviors/tasks would an organization find acceptable where your personal viewpoint may not? Select 2-3 scenarios and discuss how you would address them from a Christian worldview. Consider Matthew 18:15-18. How could you apply this to a workplace scenario?

Question 3. Refer to the ISACA code of conduct. Describe the responsibilities related to the handling of data as it pertains to legal, ethical codes of conduct, and/or agency auditing issues, frameworks, and best practices.

Question 4. InfoSec professionals are under increasing pressure to provide access to information/data without sacrificing security or usability. Explore the challenges of balancing security and usability and what results if there is a lack of balance between the two.

Question 5. Describe how you would integrate information assurance and security requirements into an organization's processes and practices.

Question 6. Examine the ethical considerations of ethics and cyberspace, ethical issues, property, availability, rights of others, respect and principles of community, resource use, allocation, and abuse, censorship, ethics-based decision tools, and cybersecurity and social responsibility.

Reference no: EM133495949

Questions Cloud

Identify at least three significant technology providers : Identify at least three significant technology providers with a strong presence in your selected region/country. Identified products/services offered.
Choose publicly traded company that issues bonds : Choose a publicly traded company that issues bonds. How would a potential investor determine the value and risk of the bond?
What is interest tax shield from? braxton debt : If? Braxton's marginal corporate tax rate is ?21%, what is the interest tax shield from? Braxton's debt in each of the next five? years?
Review the four categories of deductions : Review the four categories of deductions available for calculating the taxable estate the marital deduction
What is the purpose of digital forensics : What is the purpose of digital forensics? Explain why it is important for any organization to sustain a permanent digital forensics team.
How many new shares must the firm? issue : How many new shares must the firm? issue? describe what you can do to undo the effect of this decision.
Is high performance connected to the leadership : What is the main focus of the article - high performance and/or leadership? Is high performance connected to the leadership?
Consider the process of providing dietary advice : Consider the process of providing dietary advice. What advice will/did you give your children? What advice would you recommend the parents of young children
Analyze the group as followers : LDR 736- Analyze the group as followers. Consider strengths and opportunities in terms of the variables provided for each category.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd