Starting from:
$4.99

$0

Information Security Solution

For a Information Security Class...

Forensics is usually the more interesting of the topics for these two chapters.  Take the following scenario and map out the chain of custody needs to be followed if you are going to preserve the integrity of the evidence.

Scenario: A co-worker is suspected of surfing the Internet on their work machine and downloading pornographic material and printing some of it on the department printer during the evening hours when most people have gone home.  You are responsible to collect data to support the worker's dismissal.  Describe the data you need to obtain, the methods you would use to get it, and the chain of custody of the data once collected.  Don't just list the steps the book give you for the chain of custody, explain in detail where/how/who will hold the evidence at which step and why it is important to follow each step. What could happen to the data at each step if the chain of custody is not followed?

 

Attach the Word document to this assignment link. This assignment should be a minimum of two pages in length 

 

More products