Legal Aspects of Computer-Based Crime Overview

Other

  • Directions

    The distributed nature of the Widget Factory IT infrastructure makes the application and monitoring of technical and procedural controls a challenge. The CISO has asked that you engage in background research of common controls. Use the background information provided in the case study to evaluate the state of existing technical and procedural controls in the organization and how well they can support investigations.Part 1: In 6–8 pages, complete the following:

    • Describe the impact of access control methods and models in obtaining evidence of sufficient quality to be accepted by a court.
    • Describe the challenges of engaging in an investigation of potential criminal activity while protecting the due-process rights of the potential suspect.
    • Examine the options available to an information security professional when executives choose not to report potential computer-based criminal activity.
    • Evaluate the skills and experience levels desirable in a forensics professional who will be required to testify as an expert witness as part of his or her work.
    • Discuss the potential strategies for managing encrypted information as part of a forensics investigation.
    • Discus how the existing technical and procedural controls presented in the case study support the ability to conduct an effective investigation.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Use current APA style and formatting guidelines.
    • Length: 6–8 pages, excluding the references page and the two screen captures from the Toolwire lab.
    • Font and font size: Times New Roman, 12-point.
Criteria Non-performance Basic Proficient Distinguished
Describe the impact that access control methods and models have on obtaining evidence.
Does not describe the impact that access control methods and models have on obtaining evidence. Describes incompletely or inaccurately the impact that access control methods and models have on obtaining evidence. Describes the impact that access control methods and models have on obtaining evidence. Describes the impact that access control methods and models have on obtaining evidence, including the use of supporting examples.
Describe the challenges of engaging in an investigation while protecting the due-process rights of a suspect.
Does not describe the challenges of engaging in an investigation while protecting the due-process rights of a suspect. Describes incompletely or inaccurately the challenges of engaging in an investigation while protecting the due-process rights of a suspect. Describes the challenges of engaging in an investigation while protecting the due-process rights of a suspect. Describes the challenges of engaging in an investigation while protecting the due-process rights of a suspect, including the use of supporting examples.
Evaluate how technical and procedural controls support the ability to conduct effective investigations.
Does not evaluate how technical and procedural controls support the ability to conduct effective investigations. Evaluates incompletely or inaccurately how technical and procedural controls support the ability to conduct effective investigations. Evaluates how technical and procedural controls support the ability to conduct effective investigations. Evaluates how technical and procedural controls support the ability to conduct effective investigations, including the use of supporting examples.
Examine the options available to an information security professional when executives choose not to report potential computer-based criminal activity.
Does not examine the options available to an information security professional when executives choose not to report potential computer-based criminal activity. Examines incompletely or inaccurately the options available to an information security professional when executives choose not to report potential computer-based criminal activity. Examines the options available to an information security professional when executives choose not to report potential computer-based criminal activity. Examines the options available to an information security professional when executives choose not to report potential computer-based criminal activity, including the use of supporting examples.
Describe the skills and experience levels desirable in an expert forensics witness.
Does not describe the skills and experience levels desirable in an expert forensics witness. Describes incompletely or inaccurately the skills and experience levels desirable in an expert forensics witness. Describes the skills and experience levels desirable in an expert forensics witness. Describes the skills and experience levels desirable in an expert forensics witness, including the use of supporting examples.
Discuss strategies for managing encrypted information during a forensics investigation.
Does not discuss strategies for managing encrypted information during a forensics investigation. Discusses incompletely or inaccurately strategies for managing encrypted information during a forensics investigation. Discusses strategies for managing encrypted information during a forensics investigation. Discusses strategies for managing encrypted information during a forensics investigation, including the use of supporting examples.
Use forensics tools to reverse engineer possible malware.
Does not use forensics tools to reverse engineer possible malware. Improperly uses forensics tools to reverse engineer possible malware. Uses forensics tools to reverse engineer possible malware. Uses forensics tools to reverse engineer possible malware, including how these tools contribute to an incident investigation.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *