Saturday, November 2, 2019
Forensics Research Project 3 Paper Example | Topics and Well Written Essays - 1000 words
Forensics Project 3 - Research Paper Example The primary purpose of the computer forensic processing method would emphasize certain major factors namely image copying technology, defining principles underneath computer forensic method, formalizing most appropriate methodology in order to assemble as well as to examine the activities of the users and presenting alleged data or information to a court law. With this regard, the framework of this computer forensic method will mainly comply with four major processes that comprise acquisition, identification, evaluation and presentation (Craiger, n.d.). In relation to the provided case, it can be apparently observed that organizational resources have been misused by the staffs during the work schedule in terms of using computers, network and cell phones particularly for electronic gambling. This particular practice can unfavorably impact the overall performance of the organization through various ways. For instance, the misuse of such type of organizational resources can severely imp act on the organizationââ¬â¢s performance and reduce its competencies to achieve the ultimate goals and objectives. Moreover, the practice can also negatively effect on time, cost as well as performance of each individual attached with the organization. Steps Required to Investigate, Document and Preserve Evidence The computer forensic process with respect to the provided case scenario will be focused on conservation, recognition along with extraction of computer media with the intention of protecting the organizational resources and intellectual property. In this regard, the major functions and the implications of different steps that can be involved within the computer forensic processing method have been demonstrated in the following discussion. Step1: Acquisition The acquisition step of the proposed computer forensic processing method can be referred to assess or to keep the track of each computer system within an organization. The process significantly helps to preserve deta il evidence of the users concerning their conduct of different activities in the organization (Organization of American States, 2011). In relation to the provided case scenario, the acquisition step within the forensic method will be focused on keeping the track of uninvited or unauthorized individuals through developing any technological system within the organization. The process would enable the administrators to track and assess the activities performed by the users through allocated systems. Moreover, the step will also involve the process of preserving data or information concerning the movement of each user through their systems and enable the administrators to prepare effective documentation regarding the misuse or fraud related activities performed by the employees. Additionally, the step would also facilitate to efficiently maintain effective information flow and help the organization to protect its resources and intellectual property by a certain degree. Step2: Identifica tion The identification step is generally defined as the process of analyzing various sorts of technological aspects that include physical and logical units of the systems that are executed in an organization. The step also involves presentation of different opinion in accordance with the relevance of the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.