E-mail, social media, and mobile devices have become items where an incident is most likely to occur. It is important that a forensics investigator understand where the vulnerabilities associated with these items exist in order to perform a proper investigation.
Use the organization and characteristics described in the Mega Corp Case Study [PDF], found in the Required Resources, as the context in which to complete this assessment.
Directions
Create 68-pages evaluating e-mail, social media, and mobile device effective incident response and potential computer forensics investigations for the organization in the course case study. Recommend the following:
Describe e-mail forensics investigations.
Describe social media and mobile device investigations.
Describe what is meant by the Internet of Things.
Identify acquisition procedures for mobile devices.
Additional Requirements
Written communication: Written communication is free of errors that detract from the overall message.
APA formatting: Use current APA style and formatting guidelines.
Length: 6 pages, excluding the references page.
Font and font size: Times New Roman, 12-point.
Submission Requirements: Submit your proposal as a Word document in the assignment area.
Writing and Research Resources
Your work in this course requires use of APA style. View the online writing center’s module on Evidence and APA, and browse its other resources.
Competencies Measured
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Develop recommendations for physical security requirements in an organization.
Describe e-mail forensics investigation.
Competency 2: Develop an incident response policy for an organization.
Describe social media and mobile device investigations.
Describe what is meant by the Internet of Things.
Identify acquisitions procedures for mobile devices.
Competency 6: Communicate effectively.
Exhibit proficiency in writing and use of APA (7th edition) style.