Forensic uses of the military and law enforcement agencies


Assignment:

Question 1. Compare and contrast systems forensic uses of the military, law enforcement agencies, and private corporations. Determine which of these groups has the greatest need for systems forensics and what issues may arise if adequate forensics operations were not in place. Give a justification with your response.

Question 2. Use the Internet or the Strayer Library to research at least one commonly used system forensics software tool.From the e-Activity, discuss Discuss the tool's primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether military, law enforcement and / or private corporations use the tool. Explain why you would consider utilizing this tool as a system forensics specialist, and provide a scenario where this tool would assist you in an investigation.

Question 3. Consider the two  goals of data collection - maximizing the usefulness of the evidence and minimizing the cost of collecting it. Analyze why these goals can create significant challenges for an investigator. Determine what potential downfalls may arise in an investigation when limiting evidence collection operations purely based on cost.

Question 4. Examine the nuances of evidence collection when dealing with volatile and temporary data and provide an example. Suggest at least three  procedures, tools, and / or techniques at the disposal of an investigator that could assist him / her in evidence collection of this potentially critical evidence.

Question 5. Select two principles for policy and standards development (accountability, awareness, ethics, multidisciplinary, proportionality, integration, defense-in-depth, timeliness, reassessment, democracy, internal control, adversary, least privilege, continuity, simplicity, and policy-centered security). Examine how these principles would be the same and different for a health care organization and a financial organization.

Question 6. Determine which type of organization would have the most difficulty implementing the principles you selected. Support your answer.

Question 7. Provide a brief explanation of the Operationally, Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) methods. Explain how they are beneficial for organizations developing their IT risk management approaches.

Question 8. Explain how the size of the organization impacts the OCTAVE method utilized. Determine the factors that large organizations, as opposed to small organizations, are most concerned with. E-Activity for 7/8 - Operationally, Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) is a commonly used methodology for risk-based information security assessment and planning. Review the information located at https://www.cert.org/octave/.

Solution Preview :

Prepared by a verified Expert
Other Subject: Forensic uses of the military and law enforcement agencies
Reference No:- TGS01810402

Now Priced at $40 (50% Discount)

Recommended (90%)

Rated (4.3/5)