The work of a computer forensics specialist involves data acquisition activities. Data acquisition can be handled differently whether it is done remotely or locally, which can affect evidence handling and communication with the authorities. A computer forensics professional must be knowledgeable of networks, the cloud, and virtual machines. Cloud computing has become one of the most popular types of network. Understanding these types of networks will assist in preventing network threats.
The CISO has asked you to develop processes to investigate a crime scene. It is essential to perform proper data acquisition. The proper methodology must be selected and processes to perform the data acquisition must be determined. Once the data has been acquired, it must then be analyzed. During the analysis and validation processes, the data must be validated to ensure it is valid data.
In 68 pages, complete the following:
What acquisition method is the best for Mega Corp.
Tools and their purpose for data acquisitions.
Activities for validating data acquisition.
Identify graphic files and unknown file formats.
Identify how to determine and what data to collect.
Identify what data to analyze.
Additional Requirements
Written communication: Written communication is free of errors that detract from the overall message.
APA formatting: Use current APA style and formatting guidelines.
Length: 6 pages, excluding the references page.
Font and font size: Times New Roman, 12-point.
Submission Requirements: Submit your proposal as a Word document in the assignment area.
Writing and Research Resources
Your work in this course requires use of APA style. View the online writing center’s module on Evidence and APA, and browse its other resources.
Competencies Measured
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 2: Develop an incident response policy for an organization.
Define activities for validating data acquisitions.
Describe how to determine what data should be collected.
Identify what data to analyze.
Competency 3: Identify how law enforcement investigations are conducted.
Identify acquisition methods and recommend which method is best for Mega Corp.
Describe the tools and their purpose for data acquisition.
Competency 4: Identify legal issues related to computer crime.
Identify graphic files and determine unknown file formats.
Competency 5: Use a computer forensics tool.
Competency 6: Communicate effectively.
Exhibit proficiency in writing and use of APA (7th edition) style.