Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
Assignment 2: Forensic Lab DesignDue Week 3 and worth 100 pointsImagine the university that employs you as an information security professional has recently identified the need to design and build a d
Assignment 2: Forensic Lab DesignDue Week 3 and worth 100 pointsImagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.Write a four to five (4-5) page paper in which you:
- Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.
- Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure.
- Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices.
- Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized.
- Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence.
- Design a floor plan for the lab using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length.
- Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
- Include charts or diagrams created in Visio or one of their equivalents such as Open Project Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
- Describe the purpose and structure of a digital forensics lab.
- Examine and explain the evidence life cycle.
- Describe the constraints on digital forensic investigations.
- Develop a computer forensics deployment plan that addresses and solves a proposed business problem.
- Use technology and information resources to research issues in computer forensics.
- Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.
- @
- 165 orders completed
- ANSWER
-
Tutor has posted answer for $40.00. See answer's preview
******** *** ********* * ******* ******** ********** *** *********** *************** ********* **** *** cyber ***** rate ** ********** ** rapid bases **** *** *********** ** ************* for digital crimes ** very **** ** the ******* ***** many ********** **** ******* *** ******* *** “Cyber security *** digital ************ ** it ** **** ***** **** the proper ********* ** archived ** *********** ********** **** ******* ** practical implementation The ******* ** **** ***** ** to ***** * ****** ******* forensics lab *** *** ********** ** ** also ********* **** *** **** ****** ** ********* ** ******* *** ****** in ***************** ******** ********** ******* ********* *********** ********** ****** ***** **** work ******* *** ********* ****** ************ ********* ** *** group ** ********* ********* ******* *** ********** ***** are **** for ********** ********** and analysing *** ******* evidences ***** *** ***** ** ******** ** *** ***** ******* ****** *** the ********** ** cost ******* ** *** ******* ********** ************** ********* is **** When the *** ** ********* *** *** *** ** ********* *** *** ** **** which ** ******* ******** and used to ******** *** ********** functions task and the related ********* *** **** packages *** ******** of *** *** ** ***** ******** To ******** the scope ** *********** *** design ** *** ******** *** the identification ** activities and ************ of *** ********* *** *** ************** of ****** ******* ** *** ********* *** *** ************** of ***** tasks ********* ** *** ****** related ************* ***** ******** for *** ****** estimation *** *** ******* ******** laboratory *** ** given ******* *** **** ** ******** should be ******* appropriately *** **** ************ security professional ****** **** **** ** ********* some bookkeeping protocols ** track *** ******** The *** *** ** ******* a list ***** ****** be ******** specific2 The bench marks ****** ** **** by *** *** *** ******** ** ****** *** ***** ***** *** ********* ** the bases of ********** ****** ** *** University *** *** must keep ** **** **** *** ***** ***** *** ** adjusted ** *** *** *********** ** the ******** *** *** ****** compare *** ****** ******** **** the ****** ** ******* ****** ******** requirements *** ******** of ******* physical security ** ******* to *** ********** ** *** ****** of *** organization *** ******* *** continuity ** the ******** in the ******** conditions ****** ** ******** *** ****** **** selection *** security **** unauthorized ****** ******* ** *** physical security (University February ******** ********* ** *** physical ******** equipment for *** security ** *** ****** *** **** is given below:· ** ** ******** *********** ********* ***** ************ ***** **** *** ** ******* *** *** physical ******** ** the Lab ** ** given ******* Surveillance for ******* *** ***** ** ******* ***** ****** be setup2 *** ****** room ** *** *** must ** ******* The susceptible devices are **** be placed ** * locked room4 The ******** devices **** laptops *** hard ****** should be ****** ** * ****** ***** *** common drives C:\ *** *** ***** ****** ** ******* for ****** ***** **** **** lead ** *** ******** ** ***** * ****** backup **** should ** *********** *** *** ******** conditions3 ******** *** software tools *** ******* the ******** of *** so **** ***** can be **** **** of **** are ***** below:Biometric devices are **** *** *** ****** *************** of *** ****** ***** ******* uses a ********** for *********** ***** voice recognition *** iris scan ***** devices ***** ** ********* role ** *** physical security ** various ********* **** ********** ********* airports etc **** ********* ******* *** ***** below:Fingerprint *********** ********** *********** **************** *************** the full ******** ** *** **** *** ****** of *** ************ ********* security controls *** used *** ******* *** biometric ****** scanner ** * physical ******** ****** *** *** the authentication ** *** user ******** is **** ******** ***** ***** *** logical ******** ** *** ********* devices *** **** ****** *** *** ******** ** the *************** ********* *** US ********** *** ***** recently ****** *** ** protect *** documents *** commercial *** ********* ****** *** ****** ** ****** ********** ** break ** *** be prone to different ***** making ** ********************** users: The personnel capable of accessing *** ************ ****** ** ******** ** ******* security ******** **** ** ********* ************** ***** measures ensure **** only ******* *********** **** access ** *** systemsSecure channel use: Sensitive data ****** ** transmitted **** * ******* ****** *************** *** *** ******** of *** is ** listed below:· Guide STAR· VASST by ***** ****** ***** SecurityThese *** ******** *** **** ** ******* ****** ******** ** *** *** These *** *** ****** Five **** rating so *** ISP has ******** ***** ******** *** ******** ******************* ***** ** *********** ******** ******** ******** ***** forensics ******** *********** ******* *********** Computer ******** Data ********** ********** *********** ******** Networking and ****** Application *********** ******** ***** ***** **** the ******** *** ********* ** any ******** *********** *** ** given below:· *** *********** should *** ** ****** *** ******* ***** ************** The *** must **** * ************ work station with one common ******* **** station· ***** ****** ** * ******** ****** *********** ** *** ***** The ******** *********** ****** take an auto-backup of all *** ********* ** the *** ** ***** *** ***** ******** by *** **** station should ** ***** The analysis ***** ** *** **** ******* ****** be high· It should ** ATX ********* **** *** RAM video **** ******** **** *** **** ***** and ****** ***** processer 5 Policy ** ******** *** environment:To maintain the *********** ** *** *** ** ******** the ********* ** a critical **** For ***** ** * ********* policy **** ******* procedures *** ********* ** ********* **** ****** ** ******** ** laboratory ****** ********* *** ******** ** ******** *** ****** ********* of *** ********** (Carolina ****** ******** ********* ****** ** as ********* ******** Fire ****** and ******** ** ********* ************ ***** ******* ** air in laboratory· ****** ***** management· ****** **** ******** *** ********** equipments· ****** ** **** ******** *** **** ******* Provide ****** ******** ** *** lab ********* ****** ** *** ************ ********* *** personal *********** ***** ******** floor plan ** *** *** ** **** **** ********* The physical requirements for building *** ******** ********** *** ** ***** ******** A room of ****** ****** *** room should **** **** ****** *** **** **** a locking *********** ** evidence ********* ** **** ********* ****** *** the lab The ***** **** ** ********* ** *** ******** The ****** shot ** ***** **** ** ** given below: ConclusionAs **** ****** ** market many universities **** ******* a ******** course for Digital Forensics **** ********* is ******* based ** *** **** and *********** **** by ******** *** ****** ***** **** ****** ****** **** ** ***** ahead ** ********* **** ***** crime) **** paper **** **** the ********** ** ******** the ******** *** ***** ***** ** ***** * ****** forensics *** ********** can ****** *** **** stations and ***** ********** on *** ***** ** ****************************************************************************************************************************************************************************************************************************