[SOLVED] Malicious cyber activity threatens not only individual safety..
Prepare a well-researched and well-written response to the question below. You MUST properly cite any external, secondary sources used to develop your response and MUST answer the question.
Malicious cyber activity threatens not only individual safety but, also national and global economic security.
Computers and portable media devices such as cell phones and GPS devices contain vital digital evidence, including user information, call logs, location information, text messages, emails, images, and audio and video recordings.
Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law.
Utilize the 5 W’s (what, who, when, why, where) as you research and develop your research paper that examines the growing field of Cyber Forensics. The research SHOULD, however, be a cohesive, fluid, readable text, which strives to incorporate responses to the suggested questions listed under the 5 W’s below. Though not every bullet point needs to be answered, but your response must comprehensive and show depth of understanding.
What does the field of cyber forensics involve?
What are the main principles of cyber forensic investigation?
What does chain of custody have to do with a cyber forensic investigation?
What organizations seek to employ or contract cyber forensic investigator/examiners?
What is the role and responsibility of a cyber forensic examiner?
What skill sets must a cyber forensic examiner possess?
What certification are strongly recommended for cyber forensic investigators?
What is the current market (average) starting salary for a cyber forensics’ investigator?
Who is hiring cyber forensics examiners?
Who is offering cyber forensic training and education?
Who is applying for these positions?
When (e.g., conditions, circumstances, etc.), would a cyber forensic investigation be performed?
When would the actions of a cyber forensic investigator be called into question, potentially disallowing the admission of collected, analyzed digital evidence into a legal proceeding?
Why is the field of cyber forensics considered important in the broader field of cyber security?
Why should cyber forensic examiners/investigators be certified?
Why is the Daubert standard an important part of the field of cyber forensics?
Where would you find cyber forensics used to assist in identifying and recovering digital evidence (e.g., types of industries, professions, situations, etc.)?
Where can you specifically identify, by example, a case/situation, etc. in which a cyber forensics investigator and cyber forensic processes where used to assist in identifying and collecting digital evidence?
Are you overwhelmed by your class schedule and need help completing this assignment? You deserve the best professional and plagiarism-free writing services. Allow us to take the weight off your shoulders by clicking this button.Get help