Describe key concepts in computer forensics


Assignment: Devotional

1. Review the material in the Getting Started section, including the specific Bible passage.

2. Be sure to address to the following prompts in your paper:

a. How might this verse impact your work as an IT professional?

b. How would you apply the principles of this verse to your personal life as well as professional?

3. Your paper should be at least 250 words in length.

Discussion: Textbook Reading

Resources

• Textbook: Principles of Computer Security: CompTIA Security and Beyond

Instructions

1. Read your textbook.

2. Using the discussion link below, respond to the following questions:

a. What was the most useful takeaway for you from this workshop's reading?

b. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?

3. Discussion: Responses to Security Breaches

1. Read your textbook.

2. Using the discussion link below, respond to the following prompts and questions:

a. What types of security incidents are possible within an information systems infrastructure? Select one such incident and detail how you would respond to the incident.

b. Describe key concepts in computer forensics. What important practices should be followed when gathering forensics data?

c. Categorize the most important concepts related to legal, ethical, and privacy issues in the field of computer security. How would you go about implementing compliance to the policies to protect your organization?

3. Your initial post should be at least 300 words and supported with at least three references.

4. Assignment: Final Paper (Phase 4 of Final Project)

1. Phase 4 of the Final Project is a proposal to provide a comprehensive security plan for your organization.

2. As the final step of this proposal, you will prepare a comprehensive Security Awareness and business continuity plan (taking what you did and expanding upon the summary) that will be used throughout the organization. The plan should address awareness from the perspective of employee expectations. The business continuity plan should address the requirements needed to recover from potential disasters, whether through natural causes (weather, fire, etc.) or a security breach. The paper should be outlined as follows:

a. Executive Summary/Introduction

b. Threat Analysis

c. Mitigation Strategies

d. Business Continuity Plan

e. Security Awareness Program Plan/Overview

f. Conclusion

3. Provide transitions between these six sections. The total length of the paper should be 15 to 20 pages. You may use graphics or other features within your paper; however, these do not count toward the 15 to 20 page total.

4. Make sure the paper is double-spaced and in APA format. The paper should have a minimum of five references, which should be cited correctly within the paper as well as on the Reference page using APA format.

Attachment:- Mitigation Strategy.rar

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Describe key concepts in computer forensics
Reference No:- TGS03160536

Now Priced at $220 (50% Discount)

Recommended (94%)

Rated (4.6/5)