Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings

Homework answers / question archive / 1)Discussion Question : 250 words , APA 7 format

1)Discussion Question : 250 words , APA 7 format

Computer Science

1)Discussion Question : 250 words , APA 7 format. The METRICS-BASED Risk Assessment and Management of DIGITAL FORENSICS paper discusses two crucial phases (Appendix A). The first phase included all the forensics involved with the collection of data, while the second phase concerns defending the data collected. Discuss the correlation between the two phases to ensure credible conclusions. Textbook : Information Governance: Concepts, Strategies and Best Practices; John R.S. Fraser, Betty J. Simkins, Kristina Narvaez; Copyright © 2015 by John R.S. Fraser, Betty J. Simkins, Kristina Narvaez (ISBN 978-1-118-69196-0) Write response to below two Discussions: 2)Discussion response 1 : 125 words Digital forensics has two indispensable phases with the first phase detailing all forensics used in collecting data and the second one involves defending the data collected, ways in which data was collected, and the logistics applied from the primary data to the results (A?rnes, 2018). The first phase is crucial because it determines the results obtained after the investigation. The forensics used must be relevant to the issue under study to have valid results. Any wrong forensics can lead to misinformation about the issue under investigation. Today, there is a lot of data in cyberspace that can be used to analyze a situation to come up with well-informed conclusions. However, not all data is relevant to the issue under investigation. That is why phase one is important in digital forensics. The second phase is connected to the first phase because the user data must be analyzed by the appropriate tools to bring out the expected results (Chen, Takabi & Le-Khac, 2019). The means used to collect data should be justifiable and online with the requirements of being authenticated and justified. Not all means of data collection fits all forms of data. For instance, data related to a theft case can be collected from the scene of the crime using video footage recorded by CCTVs but observation may not be applicable in this situation because the incident took place in the past. With these deliberations, it is apparent that the two phases have to be correlated if the desired and accurate results have to be credible. Any mismatch in the two phases can lead to invalid output because they depend on one another. References A?rnes, A. (2018). Digital forensics. Hoboken, NJ: John Wiley & Sons Inc. Chen, L., Takabi, H., & Le-Khac, N.-A. (2019). Security, privacy and digital forensics in the cloud. Hoboken, NJ; Singapore: John Wiley & Sons, Inc. 3)Discussion response 2 : 125 words Effective Data Forensic Strategies Digital forensic involves a comprehensive analysis of data collection strategies targeting and establishing a pattern. It is important to relate different phases in data collection strategies to ensure effective digital forensics processing. The first phase involves establishing a strategic way of data collection to understand how an activity happened as a way of collecting the difference. Data identification is important since it can help in establishing the credibility of the data source and ensure that correct channels are followed during the data collection process. For example, research by Quick and Choo (2016) discussed the application of the scanning process in hard drives to retrieve the files since they can have high forensic values in the forensic analysis. Comprehensive data collection services in a forensic study are the foundation of effective investigation due to the availability of reliable evidence. It is appropriate to ensure that phase one has adequate data to ensure effective evidence analysis. The second phase involves ensuring that data collection strategies are effective and follow the protocols to stand as evidence in the court. In this case analysis, the results from the data collection process were run by each participant while determining the Initial Repair Cost of Mitigate. It mainly focused on establishing the criticality and the cost involved in the risk assessment process. It made it easy to identify the credibility and potential vulnerabilities in the data collection strategies. Therefore, there was an opportunity to ensure the effective Documentation and Reporting process by eliminating potential vulnerabilities in the data analysis. Hence, the data collection process and validation process are effective in the decision-making process by promoting an effective conclusion. The two phases should show a correlation to ensure enough evidence to support cyber-related cases. References Quick, D., & Choo, K. K. R. (2016). Big forensic data reduction: digital forensic images and electronic evidence. Cluster Computing, 19(2), 723-740.

Purchase A New Answer

Custom new solution created by our subject matter experts