Legal Aspects of Computer-Based Crime Overview

Other

  • Directions

    The distributed nature of the Widget Factory IT infrastructure makes the application and monitoring of technical and procedural controls a challenge. The CISO has asked that you engage in background research of common controls. Use the background information provided in the case study to evaluate the state of existing technical and procedural controls in the organization and how well they can support investigations.Part 1: In 6–8 pages, complete the following:

    • Describe the impact of access control methods and models in obtaining evidence of sufficient quality to be accepted by a court.
    • Describe the challenges of engaging in an investigation of potential criminal activity while protecting the due-process rights of the potential suspect.
    • Examine the options available to an information security professional when executives choose not to report potential computer-based criminal activity.
    • Evaluate the skills and experience levels desirable in a forensics professional who will be required to testify as an expert witness as part of his or her work.
    • Discuss the potential strategies for managing encrypted information as part of a forensics investigation.
    • Discus how the existing technical and procedural controls presented in the case study support the ability to conduct an effective investigation.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Use current APA style and formatting guidelines.
    • Length: 6–8 pages, excluding the references page and the two screen captures from the Toolwire lab.
    • Font and font size: Times New Roman, 12-point.
Criteria Non-performance Basic Proficient Distinguished
Describe the impact that access control methods and models have on obtaining evidence.
Does not describe the impact that access control methods and models have on obtaining evidence. Describes incompletely or inaccurately the impact that access control methods and models have on obtaining evidence. Describes the impact that access control methods and models have on obtaining evidence. Describes the impact that access control methods and models have on obtaining evidence, including the use of supporting examples.
Describe the challenges of engaging in an investigation while protecting the due-process rights of a suspect.
Does not describe the challenges of engaging in an investigation while protecting the due-process rights of a suspect. Describes incompletely or inaccurately the challenges of engaging in an investigation while protecting the due-process rights of a suspect. Describes the challenges of engaging in an investigation while protecting the due-process rights of a suspect. Describes the challenges of engaging in an investigation while protecting the due-process rights of a suspect, including the use of supporting examples.
Evaluate how technical and procedural controls support the ability to conduct effective investigations.
Does not evaluate how technical and procedural controls support the ability to conduct effective investigations. Evaluates incompletely or inaccurately how technical and procedural controls support the ability to conduct effective investigations. Evaluates how technical and procedural controls support the ability to conduct effective investigations. Evaluates how technical and procedural controls support the ability to conduct effective investigations, including the use of supporting examples.
Examine the options available to an information security professional when executives choose not to report potential computer-based criminal activity.
Does not examine the options available to an information security professional when executives choose not to report potential computer-based criminal activity. Examines incompletely or inaccurately the options available to an information security professional when executives choose not to report potential computer-based criminal activity. Examines the options available to an information security professional when executives choose not to report potential computer-based criminal activity. Examines the options available to an information security professional when executives choose not to report potential computer-based criminal activity, including the use of supporting examples.
Describe the skills and experience levels desirable in an expert forensics witness.
Does not describe the skills and experience levels desirable in an expert forensics witness. Describes incompletely or inaccurately the skills and experience levels desirable in an expert forensics witness. Describes the skills and experience levels desirable in an expert forensics witness. Describes the skills and experience levels desirable in an expert forensics witness, including the use of supporting examples.
Discuss strategies for managing encrypted information during a forensics investigation.
Does not discuss strategies for managing encrypted information during a forensics investigation. Discusses incompletely or inaccurately strategies for managing encrypted information during a forensics investigation. Discusses strategies for managing encrypted information during a forensics investigation. Discusses strategies for managing encrypted information during a forensics investigation, including the use of supporting examples.
Use forensics tools to reverse engineer possible malware.
Does not use forensics tools to reverse engineer possible malware. Improperly uses forensics tools to reverse engineer possible malware. Uses forensics tools to reverse engineer possible malware. Uses forensics tools to reverse engineer possible malware, including how these tools contribute to an incident investigation.
#write essay #research paper #blog writing #article writing #academic writer #reflective paper #essay pro #types of essays #write my essay #reflective essay #paper writer #essay writing service #essay writer free #essay helper #write my paper #assignment writer #write my essay for me #write an essay for me #uk essay #thesis writer #dissertation writing services #writing a research paper #academic essay #dissertation help #easy essay #do my essay #paper writing service #buy essay #essay writing help #essay service #dissertation writing #online essay writer #write my paper for me #types of essay writing #essay writing website #write my essay for free #reflective report #type my essay #thesis writing services #write paper for me #research paper writing service #essay paper #professional essay writers #write my essay online #essay help online #write my research paper #dissertation writing help #websites that write papers for you for free #write my essay for me cheap #pay someone to write my paper #pay someone to write my research paper #Essaywriting #Academicwriting #Assignmenthelp #Nursingassignment #Nursinghomework #Psychologyassignment #Physicsassignment #Philosophyassignment #Religionassignment #History #Writing #writingtips #Students #universityassignment #onlinewriting #savvyessaywriters #onlineprowriters #assignmentcollection #excelsiorwriters #writinghub #study #exclusivewritings #myassignmentgeek #expertwriters #art #transcription #grammer #college #highschool #StudentsHelpingStudents #studentshirt #StudentShoe #StudentShoes #studentshoponline #studentshopping #studentshouse #StudentShoutout #studentshowcase2017 #StudentsHub #studentsieuczy #StudentsIn #studentsinberlin #studentsinbusiness #StudentsInDubai #studentsininternational