Sign In
Not register? Register Now!
Pages:
4 pages/β‰ˆ1100 words
Sources:
Check Instructions
Style:
APA
Subject:
Law
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 20.74
Topic:

Steps to Take as the Operation Stop Hack Lead Investigator

Research Paper Instructions:

Expert Testimony
Introduction
You were the lead investigator on Operation Stop Hack and have now been subpoenaed as an expert witness in the case against the perpetrators. It is up to you to convey the complexities of the crime and evidence to the jury so they can understand the scientific procedures using in aiding the crimes resolution.
Instructions
Write a 3–5 page paper in which you:
Analyze the overall procedures for First Responder and Incident Handling and ascertain the fundamental way in which such procedures relate to the scenario in this specific case.
Explain the major steps involved in evidence acquisition and how to maintain the integrity of the evidence, outlining any and all repercussion if the evidence is improperly preserved.
Consider the importance of the chain of custody and explain the main reasons why the documentation required to preserve the chain of custody is critical.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides. Citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.
Learning Outcomes
The specific course learning outcome associated with this assignment is:
Outline the legal steps and procedures to process and collect digital evidence.

Research Paper Sample Content Preview:

Expert Testimony
Student’s name
Institution
Course
Professor’s name
Date
Expert Testimony
A hack security incident requires immediate response to ensure the perpetrators are shut before harming the intruded systems to extreme levels. Thus, the first responder should have pre-planned procedures to respond to such incidences immediately. The organized response prevents unnecessary impact on the affected organization. Also, it ensures that the first responder does not get reputational harm relating to how a particular case is handled. According to Voigt (3), every second matters after the occurrence of a security issue. The dangerous malware installed into the attacked systems spread fast, and the hackers use the compromised accounts to access more assets. Therefore, all organizations should have a trained response team that can take immediate actions to stop the malicious activities by hackers in the case of a security issue. The organization’s size does not matter in this preparation since all institutions are in danger of security attacks and unpredictable occurrences. The incidence response team handles all security incidents, breaches, and cyber threats (Voigt, 3). Planning allows the team to identify and minimize the damage, reduce the cost induced, and find to fix the event’s cause to prevent such incidences in the future.
Responding to a critical security event like hacking entails multiple steps. The first step is assembling a team (Voigt, 3). It is essential to create a team with the right people. These people should have the required skills related to the issue in the question. Also, they should have a team leader with direct contact and communication with the management to ensure that they can make any related decisions quickly. For instance, the leader needs to consult with the management before implementing critical choices, like going offline, even if the action is essential for the first responder (Voigt, 3). The second step is to detect and ascertain the source. The team should recognize the source of the breach to know the origin of the indicators (Voigt, 3). The third step is containing and recovering. Voigt (3) argues that a security system is analogous to forest fires. The team needs to contain the incidence and its source immediately after they are detected. For instance, a necessary step to contain hacking may be disabling the network connection to the systems under attack (Voigt, 3). The team must ensure the containment is made to continue operations and curb the users’ ways of intrusion for future safety.
The fourth step is assessing the damage and severity. The extent of the damage caused is identified once the smoke clears. For instance, an incident from an external attack or a malicious insider is considered severe and should be addressed accordingly to ensure it does not happen in the future (Voigt, 3). The fifth step is starting the notification process. The team should notify the affected individuals to protect their identities from issues such as disclosing the accessed data (Voigt, 3). The sixth step is starting to preventing a similar incidence in the future. Examining lessons learned after it is stabilized is essential to prevent a recurrence (Voig...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Research Paper Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!