Investigations for cybersecurity breaches


Assignment:

? Explain how the investigator performs the preliminary investigation, determines the facts of the incident, and carries out an incident review.

? Identify the requirements for acquiring and authenticating evidence.

? Identify the methods by which the investigator determines the legal restrictions, intent, and scope of the investigation.

Course Outcome:

Perform scenario-based investigations for cybersecurity breaches.

Assignment Instructions

Your forensics team has provided the initial response detailing the meaning behind the cyber-terrorism case and the different types of associated evidence. In the preliminary investigative discussion, your Point Of Contact (POC) for the cybercrime case would like your team to disclose, in your forensics plan, how you will approach the incident review and include the identification of any collection requirements for seizing, preserving, and authenticating the evidence. You will provide the POC with the known facts of the incident and what procedures were used during the initial case reviews.

Assignment Requirements

The expected length of the report is 8 to 10 pages or 2000 to 2500 words. Your project submission should include the following in an MS Word document:

1.  A title page

2. A report that includes the following:

o Effective introduction.

o The use of APA throughout the main body of the paper (e.g., Mahaney, 2009) for all technical
assertions.

o How you will approach the incident review, to include the identification of any collection requirements for acquiring and authenticating the evidence.

o How your team will approach any legal restrictions and the determination of intent and scope.

o The known facts of the incident and what procedures were used during the initial case reviews.

o A conclusion allowing the reader to reach a high level of understanding of all the major topics presented.

o A reference page in APA format.

Written Assignment Requirements

Written work should be free of spelling, grammar, and APA errors. Points deducted from the grade for each writing, spelling, or grammar error are at your instructor's discretion.

Solution Preview :

Prepared by a verified Expert
Business Management: Investigations for cybersecurity breaches
Reference No:- TGS01803376

Now Priced at $40 (50% Discount)

Recommended (94%)

Rated (4.6/5)