Description of this paper

Computer Science & Forensics

Description

solution


Question

These are discussion questions....not a research paper. They require enough to accurately answer each question. Please be sure to label each one so I don't have to piece together the answer.;Identify the role you believe mobile devices have on email investigations. Discuss and provide an example of the added challenges that have been introduced based on the advancement of mobile device technologies.;Use the Internet to research and select at least one mobile device forensics tool that aids a forensic specialist in an email investigation, thoroughly describe the mobile device forensics tool you researched, including its functions, advantages / disadvantages, and cost. Explain why you would consider utilizing this tool as a system forensics specialist, and provide a scenario where this tool would assist you in an email investigation.;Analyze the forensic challenges regarding webmail that are stored in ?the cloud? and determine whether or not you believe webmail is easier to analyze than standard client-server email solutions forensic specialists. Determine the legal concerns that may exist when attempting to investigate webmail and why these challenges are of concern. Provide a rationale with your response.;Go to the Ars Technica Website to read the article titled ? Apple holds the master key when it comes to iCloud security, privacy,? dated April 2012, located at http://arstechnica.com/apple/2012/04/apple-holds-the-master-key-when-it-comes-to-icloud-security-privacy/, discuss the forensic concerns regarding Apple?s iCloud and how Apple has designed this application to assist in investigations, including email investigations. Determine whether or not you believe end users of iCloud should have concern with the encryption methods and explain in detail why you believe this way.;Assess the main policy elements governing data classification and data handling in organizations to ensure that data remain protected at rest and in transit. Describe the methods that organizations can implement to ensure that data remains protected at rest and in transit.;Determine which areas of the data life cycle are the most challenging to control and explain why (i.e., creation, access, use, transmission, storage, physical transport, and destruction).;Briefly describe the main purpose of Business Impact Analysis (BIA), Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) policies. Determine how these policies are similar and how are they different.;Suggest a generally well-known example of an incident in the past 10-15 years, such as Hurricane Katrina, that highlights the importance of conducting the appropriate planning and development of these policies (i.e., BIA, BCP, and DRP). Identify the areas in your example that would be affected the most without a policy such as the ones mentioned above.

 

Paper#64171 | Written in 18-Jul-2015

Price : $25
SiteLock