discussion 1The computer forensics investigative process includes five steps: Id

Sep 1, 2021 | Uncategorized

discussion 1The computer forensics investigative process includes five steps: Identification, Preservation, Collection, Examination, and Presentation. When a breach has occurred in a medium to large-sized company, cybersecurity experts, and sometimes forensics specialists will investigate using this process. In a small company, it2019;s likely that the IT staff will have multiple roles, but what do you think about the larger companies? Should the experts who do penetration testing or maintain the security defenses be involved in the forensics investigation after a breach? What are some pros and cons you can see in having a lot of people examining the breach?discussion 2Describe how monitoring worker activities can increase the security within organizations. Describe the rationale that managers should use to determine the degree of monitoring that the organization should conduct.Explain the extent to which you believe an organization has the right to monitor user actions and traffic. Determine the actions organizations can take to mitigate the potential issues associated with monitoring user actions and traffic.discussion 3Propose at least three control measures that organizations need to put in place to ensure that they remain complaint with emerging technologies and in a continually changing IT environment.Examine the correlation of effective configuration management and change control procedures to remain compliant with emerging technologies and IT security changes.

Don't use plagiarized sources. Get Your Custom Essay on
discussion 1The computer forensics investigative process includes five steps: Id
Just from $12/Page
Order Essay
  

Why dont you let a reliable essay writing service handle your assignments ?