What precautions are necessary to preserve evidencestate

Assignment Help Basic Computer Science
Reference no: EM133053444

Project Part: Evidence Collection Policy

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collectingevidence?

2. What precautions are necessary to preserve evidencestate?

3. How do you ensure evidence remains in its initialstate?

4. What information and procedures are necessary to ensure evidence is admissible incourt?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

- Description of information required for items ofevidence

- Documentation required in addition to item details (personnel, description of circumstances,and soon)

- Description of measures required to preserve initial evidenceintegrity

- Description of measures required to preserve ongoing evidenceintegrity

- Controls necessary to maintain evidence integrity instorage

- Documentation required to demonstrate evidenceintegrity.

Reference no: EM133053444

Questions Cloud

Windows virtual desktop : The Windows Virtual Desktop provides a way to access your computer-based resources on multiple computers without having to have them stored
Benefit the business organizations : Do you think that the 5G technologies are more likely to benefit the business organizations,
Creating good password security : An IT Security consultant has made three primary recommendations regarding passwords. Make authenticators unforgeable, do not allow email or user ID as password
Important and effective communication tool : It is common knowledge that the service-level agreement (SLA) document is the most important and effective communication tool
What precautions are necessary to preserve evidencestate : What are the main concerns when collectingevidence? What precautions are necessary to preserve evidencestate?
Certification for it support technician : Discuss the importance of CompTIA A+ certification for an IT support technician. How might certification enhance your career?
Describe comprehensive security policy : Identify possible network infrastructure vulnerabilities. Create and describe a comprehensive security policy for the company that will:
Calculate the total contribution margin at each price level : Vasquez Company sells a single product that has variable costs of $5 per unit. Calculate the total contribution margin at each price level
Project methodologies from smartsheet : "What's the Difference? Agile vs. Scrum vs. Waterfall vs. Kanban" on project methodologies from Smartsheet.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Essay about component design and component development

Write an essay about Component design, Component development, Component assembly, Component design patterns, Component connectivity

  Write a two-process vhdl description of the state machine

Produce next state and output logic for the state machine of Exercise 5.5 and write a VHDL description of the hardware using simple gates and positive edgetriggered D flip-flops. Verify this hardware by simulation.

  Explaining accuracy when using training set data

Explain what can you say about accuracy when using training set data and when using separate percentage to train?

  Definitions related standards and policies

This section usually contains definitions of technical or ambiguous terms, cross-references to applicable regulations and other policies that relate to policies

  Python program to compute cost of carpeting room

The third assignment involves writing a Python program to compute the cost of carpeting a room.

  What advice do you have for users of electronic media

What advice do you have for users of electronic media? Are there pitfalls to avoid?

  Four types of markets

The following video discusses the four types of markets: perfect competition, monopolistic competition, oligopoly, and monopoly.

  Bank of canada purchases government bonds

If Bank of Canada purchases government bonds in the bonds market, the reserves of the chartered banks will increase. Why?

  Provide future of mimo

What is MIMO? What's the history? What issues are addressed? What are the goals? Identify all advantages and disadvantages of MIMO.

  Write a function to draw each figure

Need working c program code for a program that has the ability to draw patterns of characters on the output terminal that will show a solid square, a hollow box or a solid isosceles triangle provided the character to draw with the # of rows.

  Health Grades-Quality Check or NCQA Health Plan Report

Using one of the many online resources such as Health Grades, Leapfrog's Hospital Quality and Safety Survey Results, Quality Check or NCQA's Health Plan Report

  Population mean expenditure for males and females

What is the point estimate between the population mean expenditure for males and the population mean expenditure for females?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd