Secure the laptop computer of an individual who was dismissed
Other
you have been asked by management to secure the laptop computer of an individual who was just dismissed from the company under unfavorable circumstances. Describe how you would start this incident off correctly by properly protecting and securing the evidence on the laptop.
Topics to include about evidence:
Identify the rules and types of evidence. • Collect evidence. • Preserve evidence. • Maintain a viable chain of custody. • Investigate a computer crime or policy violation.
The preservation, identification, documentation, and interpretation of computer data • Reasons to perform computer forensics – Investigate systems as related to violation of laws – Ensure compliance with organization’s policies – Investigate systems victimized by remote attacks
Incident Response Cycle:
• Discover and report – Administer an incident response reporting process • Confirm – Specialists review incident report and confirm occurrence • Investigate – Response team investigates incident in detail • Recover – Systems and applications returned to operational status • Lessons learned – Action items to correct weaknesses and make improvements
minimum 2 page, 2 references,APA format
