Q.4.2 Read the following scenario and then answer the questions that follow: You are the enterprise administrator in your organisation. You are responsible for all systems including servers, clients, databases, equipment, and mobile devices. Your ultimate goals are to ensure that the network infrastructure is highly available and secured. You have been alerted that a staff member, Employee A, has deleted and corrupted numerous files on the system that would have contributed to providing evidence in a scheduled disciplinary hearing against Employee A. The files deleted have an impact on the business continuity, audit trails, and data integrity. Q.4.2.1 Outline at least four steps you would have taken to secure the crime scene as soon as you were alerted of the incident. Q.4.2.2 Explain what Chain of Custody means and then provide an example of how you would establish such.

Principles of Information Security (MindTap Course List)
6th Edition
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Michael E. Whitman, Herbert J. Mattord
Chapter6: Security Technology: Access Controls, Firewalls, And Vpns
Section: Chapter Questions
Problem 6RQ
icon
Related questions
Question
Hi please answer the question, this is one question it's 4.2 as a whole. Thank you.
Q.4.2 Read the following scenario and then answer the questions that follow:
You are the enterprise administrator in your organisation. You are responsible for
all systems including servers, clients, databases, equipment, and mobile devices.
Your ultimate goals are to ensure that the network infrastructure is highly
available and secured. You have been alerted that a staff member, Employee A,
has deleted and corrupted numerous files on the system that would have
contributed to providing evidence in a scheduled disciplinary hearing against
Employee A. The files deleted have an impact on the business continuity, audit
trails, and data integrity.
Q.4.2.1 Outline at least four steps you would have taken to secure the crime
scene as soon as you were alerted of the incident.
Q.4.2.2 Explain what Chain of Custody means and then provide an example of
how you would establish such.
Transcribed Image Text:Q.4.2 Read the following scenario and then answer the questions that follow: You are the enterprise administrator in your organisation. You are responsible for all systems including servers, clients, databases, equipment, and mobile devices. Your ultimate goals are to ensure that the network infrastructure is highly available and secured. You have been alerted that a staff member, Employee A, has deleted and corrupted numerous files on the system that would have contributed to providing evidence in a scheduled disciplinary hearing against Employee A. The files deleted have an impact on the business continuity, audit trails, and data integrity. Q.4.2.1 Outline at least four steps you would have taken to secure the crime scene as soon as you were alerted of the incident. Q.4.2.2 Explain what Chain of Custody means and then provide an example of how you would establish such.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Fundamentals of managing system
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning