Tuesday, May 7, 2019

Forensics Research Project 3 Paper Example | Topics and Well Written Essays - 1000 words

Forensics Project 3 - Research Paper ExampleThe primary purpose of the computing device rhetorical bear on method would emphasize certain major factors namely image copying technology, defining principles underneath data processor forensic method, formalizing most appropriate methodology in order to assemble as sanitary as to examine the activities of the users and presenting alleged data or information to a court law. With this regard, the framework of this computer forensic method will mainly comply with four major processes that comprise acquisition, realization, evaluation and monstrance (Craiger, n.d.). In relation to the provided case, it can be apparently observed that organizational resources have been defiled by the staffs during the work schedule in terms of using computers, network and cell phones positionly for electronic gambling. This particular practice can unfavorably impact the overall slaying of the organization with various ways. For instance, the misus e of such type of organizational resources can severely impact on the organizations performance and reduce its competencies to achieve the ultimate goals and objectives. Moreover, the practice can also negatively effect on time, embody as well as performance of each individual attached with the organization. Steps Required to Investigate, written document and Preserve Evidence The computer forensic process with respect to the provided case scenario will be focused on conservation, recognition along with extraction of computer media with the intention of protecting the organizational resources and intellectual property. In this regard, the major functions and the implications of different steps that can be involved within the computer forensic processing method have been demonstrated in the following discussion. Step1 Acquisition The acquisition step of the proposed computer forensic processing method can be referred to assess or to keep the track of each computer system within an organization. The process significantly helps to preserve detail evidence of the users concerning their conduct of different activities in the organization (Organization of American States, 2011). In relation to the provided case scenario, the acquisition step within the forensic method will be focused on keeping the track of uninvited or unauthorized individuals through developing any techno licit system within the organization. The process would enable the administrators to track and assess the activities performed by the users through allocated systems. Moreover, the step will also involve the process of preserving data or information concerning the endeavor of each user through their systems and enable the administrators to prepare effective documentation regarding the misuse or pretender related activities performed by the employees. Additionally, the step would also facilitate to efficiently maintain effective information campaign and help the organization to protect its re sources and intellectual property by a certain degree. Step2 Identification The identification step is generally defined as the process of analyzing various sorts of technological aspects that include physical and logical units of the systems that are executed in an organization. The step also involves presentation of different opinion in accordance with the relevance of the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.