Monday, June 17, 2019

Forensics Research Project 3 Paper Example | Topics and Well Written Essays - 1000 words

Forensics Project 3 - Research Paper ExampleThe primary purpose of the data mathematical processor forensic processing method would emphasize certain major factors namely image copying technology, defining principles underneath computer forensic method, formalizing most appropriate methodology in order to assemble as well as to examine the activities of the users and presenting alleged data or information to a court law. With this regard, the framework of this computer forensic method will mainly comply with four major processes that comprise acquisition, identification, evaluation and presentation (Craiger, n.d.). In relation to the provided slipperiness, it can be ostensibly observed that organizational resources have been misused by the staffs during the work schedule in terms of using computers, network and cell phones particular(a)ly for electronic gambling. This particular practice can unfavorably impact the overall performance of the organization through and through var ious ways. For instance, the misuse of such type of organizational resources can poorly impact on the organizations performance and reduce its competencies to achieve the ultimate goals and objectives. Moreover, the practice can also negatively effect on time, salute as well as performance of each individual attached with the organization. Steps Required to Investigate, Document and Preserve Evidence The computer forensic process with respect to the provided case scenario will be focused on conservation, recognition along with extraction of computer media with the intention of protecting the organizational resources and intellectual post. In this regard, the major functions and the implications of different steps that can be ingestd within the computer forensic processing method have been demonstrated in the pastime discussion. Step1 Acquisition The acquisition step of the proposed computer forensic processing method can be referred to assess or to keep the track of each comput er system within an organization. The process significantly helps to preserve detail evidence of the users concerning their conduct of different activities in the organization (Organization of American States, 2011). In relation to the provided case scenario, the acquisition step within the forensic method will be focused on keeping the track of uninvited or unauthorized individuals through developing any technolegitimate system within the organization. The process would enable the administrators to track and assess the activities performed by the users through allocated systems. Moreover, the step will also involve the process of preserving data or information concerning the movement of each user through their systems and enable the administrators to prepare effective documentation regarding the misuse or taradiddle related activities performed by the employees. Additionally, the step would also facilitate to efficiently maintain effective information flow and help the organizatio n to protect its resources and intellectual property by a certain degree. Step2 Identification The identification step is generally defined as the process of analyzing various sorts of technological aspects that include physical and logical units of the systems that are executed in an organization. The step also involves presentation of different opinion in accordance with the relevance of the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.