You as an information security professional

Assignment Help Basic Computer Science
Reference no: EM13951140

Assignment 2: Forensic Lab Design

Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.

Write a four to five (4-5) page paper in which you:
1. Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.
2. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure.
3. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices.
4. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized.
5. Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence.
6. Design a floor plan for the lab using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or one of their equivalents such as Open Project Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Describe the purpose and structure of a digital forensics lab.
• Examine and explain the evidence life cycle.
• Describe the constraints on digital forensic investigations.
• Develop a computer forensics deployment plan that addresses and solves a proposed business problem.
• Use technology and information resources to research issues in computer forensics.
• Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

Reference no: EM13951140

Questions Cloud

Security and privacy in the 21st century : Read the following article and describe the issues associated with using social media networks. Then describe privacy and security consequences that might occur, especially when using the social media networks inappropriately.
Use the encase software or digital forensics framework : Compare and contrast systems forensic uses of the military, law enforcement agencies, and private corporations. Determine which of these groups has the greatest need for systems forensics and what issues may arise if adequate forensics operations ..
Indicate how you would measure the variable : Identify and list the variables for analysis required to address the question/problem. For each variable, indicate how you would measure the variable (just list a few typical values, and the maximum and minimum values if the variable is quantitati..
Write a c program that takes an integer argument : Write a C program that takes an integer argument from the command line and outputs the sum of all digits of the integer. For example, the result of the invocation sum of digits 12345 should be 15.
You as an information security professional : Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.
Use of motivation and teamwork : The Chief Financial Officer (CFO) for ABC Construction Inc. has been promoted to the newly created position of Vice President of Operations. The CFO's absence leaves a void in the knowledge base of the owners' group regarding several key operation..
Process of ethical business decision making : Determine the considerations for and process of ethical business decision making to balance corporate and social responsibilities, and address moral, economic, and legal concerns.
Communications manager for international gadgets : As the new communications manager for International Gadgets, you have come across many examples of ineffective communications, including some older directives that were never carried out, mostly because of their unclear nature.
Changing technology and business environments : Rapidly changing technology and business environments might have impacted each generation differently. Do you believe that each generation has similar needs for products or services?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Cloud services

Cloud Services

  Integer value from 1 to20 along with as squared value

Write an application that displays every integer value from 1 to20 along with as squared value

  How integer variables are typically represented on computer

Briefly describe how integer variables are typically represented on a computer. (Look up one's complement and two's complement arithmetic in an introductory computer science textbook if you are not familiar with these.)

  What will the following code fragment print

What will the following code fragment print?

  The acquisition of software is complex for various reasons

The acquisition of software is complex for various reasons: an organization may have any number of software applications, which keep changing over time

  Draw an event-graph of a distributed system

Draw an event-graph of a distributed system of three concurrent processes which are communicating messages, and synchronized by their respective logical clocks

  Make a marketing plan for

Final Assignment A: Choosing a Business Idea In your next assignment, you'll create a marketing plan for a business. Before you create a marketing plan, you'll think about what type of business you'd like to make a marketing plan for.

  Big-oh definition for a function

By using the definition of Big-Oh show that if g1(n) is in O(f(n)) and g2(n) is in O(f(n)), then the sum g1(n) + g2(n) is in O(f(n)).

  Constructs an internal linked representation of the tree

Output Your program must print a string representing the postorder traversal of the tree followed by a newline character.

  Show at least the state of machine and state of any memory

Consider two machines, a classical von Neumann architecture as well as a more modern machine with two buses.

  What are online communities

What are online communities. How do online communities differ from traditional communities

  Discuss the merits of unified architectures vs. proprietary

Discuss the merits of unified architectures vs. proprietary technologies in ensuring standards compliance and cybersecurity?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd