security policy
Investigation Considerations
A digital forensic investigation process can involve many steps and procedures. The objective is to obtain unbiased information in a verifiable manner using accepted forensic practices. In this project, you will perform some of the steps necessary for setting up an investigation. These steps include designing interview questions that establish the needs of the case and provide focus for your investigative efforts. You will also determine what resources may be needed to conduct the investigation. Once you have this information, you will be able to develop an investigation plan that properly sequences activities and processes, allowing you to develop time estimates and contingency plans should you encounter challenges in the investigation.
This situation involves two computers and a thumb drive. After clear authorization to proceed has been obtained, one of the first investigative decision points is whether to process the items of evidence individually or together. Processing computers individually makes sense when they are not likely tied to the same case. However, if the computers are linked to the same case, there can be advantages in processing them together.
There are four steps in this project. In Step 1, you will develop interview protocols and identify documentation needs for a forensic investigation. In Step 2, you will identify tools and software needed for the investigation. In Step 3, you will develop a plan for conducting the investigation, and in Step 4, you will consolidate your efforts in the form of a single document to be submitted to your supervisor (i.e., your instructor). The final assignment in this project is a planning document with a title page, table of contents, and distinct section for each of the three steps in the project. Consult the relevant sections of Guidelines for Project 1 Investigation Project Plan in every step.
In Step 1, get started on the plan by creating an interview form to record questions, key words, and authorization information, and to complete the legal forms needed in this case. However, before you can do that, you need to review your training in criminal investigations.
Your tasks in Step 1 are to create interview forms to record questions, key words, and authorization information, and to designate other legal forms that will be needed in this case. It is important for you to describe the importance of each form that you create in the body of your final Project Plan assignment and include in-text reference citations for all of your content. The forms that you complete as part of Step 1 will be included in your Investigation Project Plan, the final assignment for this project.
As part of the investigation into two computers and a thumb drive, it’s important to do the necessary preliminary work. In criminal investigations, there are laws governing chain of custody, search warrants, subpoenas, jurisdiction, and the plain view doctrine. It’s important to be familiar with these topics. Review forensic laws and regulations that relate to cybercrime, as well as rules of digital forensics in preparation for your digital forensic investigation.
The next thing to do is to read the police report and perform a quick inventory of devices that are thought to contain evidence of the crime. You have set up a meeting with the lead detectives and the prosecutor handling the case.
You have received an official request for assistance that provides you with authority to conduct the investigation. You realize it will be impossible to produce a detailed investigation project plan prior to your meeting with the detectives and the prosecutor. First, you need to develop a series of questions to establish the key people and activities. These questions should address potential criminal activity, timelines, and people who need to be investigated.
It is also important to determine whether different aspects of the case are being pursued by other investigators and to include those investigators on your contact list. In addition, some situations may involve organizations or individuals who need to adhere to various types of industry compliance. This situation may require you to follow special procedures.
In Step 2, you will consider the types of resources needed for the investigation.
Step 2: List Required Forensic Equipment, Software, and Labor Expenses
In Step 1, you developed forms and templates to collect the legal, criminal, and technical information that lays the groundwork for your investigation. In this step, you will consider the types of equipment and human resources needed to conduct the investigation and create a budget table that includes expenses for software licenses, computers, storage devices, number of digital forensics examiners, digital forensics examiners’ labor hours, examiner hourly pay rate, including time spent for each phase of the investigation process in gathering evidence analysis, reporting, presentation preparation and court appearance(s).
It is important to total overall costs of all equipment and expenses in your budget table. By making these preparations, you are establishing forensic readiness. Required resources can include people; tools and technologies such as RAID storage, deployment kits, or imaging programs; and budget and timeline information.
Develop a checklist. It will be included in the final Investigation Project Plan.
In the next step, you will begin to prepare a plan for managing a digital forensic investigation.
Step 3: Plan Your Investigation
In the prior step, you determined what resources would be necessary for your investigation. In this step, you will develop a plan for managing the investigation. The requirements for writing case reports reflect the step-by-step rigidity of the criminal investigation process itself. Being able to articulate time, task, money, and personnel requirements is essential.
Project management is a skill set that is not often linked to digital forensics and criminal investigations. That is unfortunate because effective project management can have a dramatic impact on the success and accuracy of an investigation. Identifying the tasks that need to be performed, their sequence, and their duration are important considerations, especially in the face of “wild cards” such as delays in obtaining correct search warrants and subpoenas. It is also important to have a clear understanding of the goals for the investigation as you will likely be called upon to present conclusions and opinions of your findings.
Your project plan should include a properly sequenced narrative timeline and a separately labeled and sequenced Visual Graphic Timeline chart that reflects the time intervals between each phase of the evidence acquisition and investigation processes (e.g., 30 hours gathering evidence spread across five business days, 60 hours of analysis over 10 business days, 90 days for reporting and court preparation, etc.) including detailed time estimates, and contingency plans. Your plan will serve many purposes, including the assignment of a project budget. As you create your plan, be sure to include in your meeting agenda communications and reporting: who should be involved, how the activities should be carried out, how often, and under what circumstances (i.e., modality, frequency).
Once you have developed your project management plan, move on to the next step, where you will submit your final assignment.
Step 4: Prepare and Submit Completed Investigation Project Plan
For your final assignment, you will combine the results of the previous three steps into a single planning document—an Investigation Project Plan—with a title page, a table of contents, and a distinct section for each of the three steps. The plan should include:
- Forms documenting key people, meeting agenda, key activities and reporting, key words, investigation timeline narrative, visual graphic timeline chart, authorization confirmation (e.g., ownership, jurisdiction), and related investigations. Designation of the legal forms required for criminal investigations should also be included. (Step 1)
- Resource checklist for equipment, human resources and labor expenses (Step 2)
- Management plan (Step 3)
- Search and seizure form(s)
- Chain of custody form
The organization and details of your plan is important. Be sure to refer to the Guidelines for Project 1 Investigation Project Plan to meet the minimum standards needed for this project.
All sources of information must be appropriately referenced. Submit your completed Investigation Project Plan to your supervisor (instructor) for evaluation upon completion.
Essay Questions
The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing sources.
Question #1
Immunomedics was alerted that there was some negative buzz about the company in a chat room. The poster used a pseudonym, and therefore the company was unable to identify the poster for lawsuit purposes. The only information the company could ascertain was the poster’s ISP. So the company decided to subpoena the ISP for identity information of the poster in order to file suit against the poster. How should the courts handle these cases, where the company’s complaints may, or may not rise to the level of an actionable legal claim?
Chicago Lawyers Committee for Civil Rights Under Law, Inc. v. Craigslist, 519 F.3d 666 (7th Cir. 2008).
Question #2.
Users of the popular Internet website Craigslist are able to post advertisements for housing that permit statements regarding the preference, limitation, or discrimination of others based on race, religion, sex, or family status. The Fair Housing Act (FHA), however, prohibits making, printing, or publishing a notice, statement, or advertisement for sale or rental of dwellings indicating preference, limitation, or discrimination based on protected classes. As such, the Chicago Lawyers Committee for Civil Rights Under Law, Inc. brought suit against Craigslist alleging a violation of the FHA. In defense, Craigslist claimed that it was immune from liability based on Section 230(c)(1) of the CDA, which protects interactive computer services from liability for unlawful third-party content. Should Craigslist be subject to liability for FHA violations? Why or why not? Cite to appropriate legal principles when explaining your answer.
Just part B
Assignment Content
- The presentation was a success, and the CIO of the organization you chose, while pleased, has another task for you. Because of the overwhelming support he gained from your presentation, he is assigned with staffing a team to provide the IDS solution. Therefore, you will provide him with the following information to consider in his planning:
Part A
Create 1- to 2-page summary, and do the following:- Identify the number of additional employees necessary to rollout and support an IDS desktop solution.
- Explain how individuals will work with the existing desktop support and malware teams.
- Identify the job title for those who normally perform rollout and support functions for the IDS desktop solution.
- Outline the daily duties for the additional employees hired for rollout and support functions for the IDS desktop solution.
- Part B
Create an infographic displaying an organization chart, and do the following: - Identify job titles provided in your summary and how they fit in with the existing cybersecurity team.
- Indicate the industry certifications the new IDS rollout-and-support-function employees should have or can work toward.
- Format your citations according to APA guidelines.
Submit your assignment.
HR wk 6 Dis
minimum 500 words
Discuss the following questions: 1. What are the benefits and challenges associated with public and private blockchain and which has the most potential for application in human resource management? 2. What are Smart Contracts and how might they be applied in human resource management? 3. How might Blockchain technology impact labor relations and employee safety? You are requiredto cite this week’s assigned readings in your paper.
Use the following headings to organize your paper: Introduction, Question 1, Question 2, Question 3, Conclusion, References.
Writing Requirements for All Assignments:
- References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
- Always include a cover page and reference page with all submissions
- Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.
- Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
- No abbreviations, no contractions – write formally
- Write in the third person formal voice (no first or second person pronouns)
- Write MORE than the minimum requirement of the word count assigned
- As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
- Indent the first line of each new paragraph five spaces
- Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
- Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.
Digital Forensics
1/2.
Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.
Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more :
- Summarize the case
- Give your opinion of the decision.
- Describe how the case deals with the material in this chapter
2/2.
Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case?
MIN 300 WORDS FOR EACH QUESTION (1&2). PLEASE MAKE SURE NO PLAGIARISM.
Question
Company overview of stockman Trader and what services offered.
ERM Week 2
Q1. 275 words
Enterprise Risk Management Integrating with Strategy and Performance Executive Summary. (2017, June). Retrieved from https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf
Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with Strategy (p. 35). Retrieved from Poole College of Management, NCSU website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf
- Which case study in the paper among above two was most interesting to you and why?
- Do you think that ERM is necessary in the contemporary organization and why?
Q2. research paper – SEPARATE Document – 5 full pages
Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements:
- Be approximately 5 full pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Computer Security Credentials
What avenues should an aspiring information security professional use in acquiring professional credentials?
Video Sources:
Security Education and Training Requirements
Top 10 IT Certifications for Security Cleared Professionals
What a CompTIA Security+ Certification Can Do For You
How to pass IT certifications
Week 15 Discussion
Discussion (Chapter 13): Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.