What is the purpose of digital forensics

Assignment Help Management Information Sys
Reference no: EM133495949

Assignment: Social Media and Digital Environments Paper

In today's world, the ever-changing social media and digital environments require professionals to have a solid foundation in law and ethics. As a future InfoSec professional, it will be required of you. Your role will be critical in helping to control the organization's liability for privacy and security risks.

Prior to beginning this assignment, view the video "2-1 Introduction to Topic 2," located in the topic Resources.

In a 1,500 to 1,750 words summary, address each item below to demonstrate how one would build a reliable, ethical, and legal information system that businesses and consumers can trust.

Part 1

As the computer forensics industry is growing, consider how the methods for handling computer crimes differ from traditional methods. Make sure to address the following:

Question 1. What is the purpose of digital forensics?

Question 2. Explain why it is important for any organization to sustain a permanent digital forensics team.

Question 3. In digital forensics, must all investigations follow the same basic methodology? Justify your rationale and explain the steps involved in this methodology.

Question 4. Concerning digital forensics, list the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data. Note: This information can be presented in a table or chart.

Question 5. Examine the U.S. federal laws and legal issues associated with cyber threats, especially cyber types such as fraud and financial cybercrimes.

Question 6. Using the organization you selected in Topic 1, discuss the legal rights of the organization to perform forensic investigations on personal mobile devices that are part of your BYOD policy.

Part 2

In many situations, multiple levels of government must work in partnership when ensuring security compliance. As a cybersecurity professional, research the following:

Question 1. Describe the federal, state, and local cyber defense partners/structures.

Question 2. Examine the laws, regulations, and standards that organizations use to align with government requirements around cybersecurity best practices within their industry.

Question 3. Explain federal laws and authorities, including the Computer Security Act, Sarbanes - Oxley, Gramm - Leach - Bliley, Privacy (COPPA) HIPAA / FERPA, USA Patriot Act, Americans with Disabilities Act, Section 508, and other Federal laws and regulations.

Part 3

For each scenario, identify the applicable law(s) it would fall under and describe how the type of legal dispute (civil, criminal, or private) affects the evidence used to resolve it. Note: This information can be presented in a table.

1. Transmission of underage photographs to various email addresses in California, Arizona, and Colorado
2. Colonial Pipeline Hack
3. Victim's identity used to open a new account
4. Bank fraud/scam
5. A firm's credit card records are stolen

Part 4

When providing information assurance, a sound defense strategy does not only look at the legal aspects but also the ethical abuses of abilities on the job.

Question 1. There are three main categories of unethical behavior that organizations must seek to minimize: ignorance, accident, and intent. From your research and your professional/personal experience, provide examples of each category and best practices for how to prevent such activities from happening.

Question 2. What happens when a job task borders on unethical from your personal viewpoint? Is your response to the issue any different than what you discussed above? What behaviors/tasks would an organization find acceptable where your personal viewpoint may not? Select 2-3 scenarios and discuss how you would address them from a Christian worldview. Consider Matthew 18:15-18. How could you apply this to a workplace scenario?

Question 3. Refer to the ISACA code of conduct. Describe the responsibilities related to the handling of data as it pertains to legal, ethical codes of conduct, and/or agency auditing issues, frameworks, and best practices.

Question 4. InfoSec professionals are under increasing pressure to provide access to information/data without sacrificing security or usability. Explore the challenges of balancing security and usability and what results if there is a lack of balance between the two.

Question 5. Describe how you would integrate information assurance and security requirements into an organization's processes and practices.

Question 6. Examine the ethical considerations of ethics and cyberspace, ethical issues, property, availability, rights of others, respect and principles of community, resource use, allocation, and abuse, censorship, ethics-based decision tools, and cybersecurity and social responsibility.

Reference no: EM133495949

Questions Cloud

Identify at least three significant technology providers : Identify at least three significant technology providers with a strong presence in your selected region/country. Identified products/services offered.
Choose publicly traded company that issues bonds : Choose a publicly traded company that issues bonds. How would a potential investor determine the value and risk of the bond?
What is interest tax shield from? braxton debt : If? Braxton's marginal corporate tax rate is ?21%, what is the interest tax shield from? Braxton's debt in each of the next five? years?
Review the four categories of deductions : Review the four categories of deductions available for calculating the taxable estate the marital deduction
What is the purpose of digital forensics : What is the purpose of digital forensics? Explain why it is important for any organization to sustain a permanent digital forensics team.
How many new shares must the firm? issue : How many new shares must the firm? issue? describe what you can do to undo the effect of this decision.
Is high performance connected to the leadership : What is the main focus of the article - high performance and/or leadership? Is high performance connected to the leadership?
Consider the process of providing dietary advice : Consider the process of providing dietary advice. What advice will/did you give your children? What advice would you recommend the parents of young children
Analyze the group as followers : LDR 736- Analyze the group as followers. Consider strengths and opportunities in terms of the variables provided for each category.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain how to collect the evidence from different media

Explain to the CEO what those 2 different analysis methods consist of. Explain why they are different. Explain how to collect the evidence from different media.

  Describe the case situation -structure of the organization

The case study presented in Case 4 is about the South Australian Water company trying to align information technology in a publically owned organization.

  Explain the focus of mis systems and kms systems

Explain the differences and focus of MIS systems and KMS systems. Research online, present a specific company that most benefits from each type of system.

  What you do if you realized that requirements were incorrect

What are some ways in which you can ensure that the requirements are complete and accurate? What would you do if you realized that some of the requirements were incorrect? How could you fix such inaccuracies?

  Importance of doing research in big data analytics

For a research interest in area of Big data Analytics. what are the Advantages of Big data analytics in information technology?

  Increase awareness of your erp implementation plans

What are some of the effective tools you may use to reduce resistance to system change and increase awareness of your ERP implementation plans?

  Examine the prevalence of honeypots

Examine the prevalence of honeypots and honey nets? Evaluate the advantages and disadvantages of using each.

  Explore current european and united states industry standard

Critically analyze current European and United States industry standards or recommendations for any Information Technology (IT) area or subarea.

  Do you see the techniques you reviewed as an advantage

Reflecting on your program of study so far, how does this class prepare you for the world of data visualizations and more specifically.

  Summary of the current business processes

Summary of the current business processes and Business objectives of your Internet strategy - How will you launch and sustain your integrated

  How did the information systems implemented

How did the information systems and the organization design changes implemented by Knudstorp align with the changes in business strategy?

  Data captureidentify two ways that healthcare organizations

data captureidentify two ways that healthcare organizations perform marketing related data capture that do not violate

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd