Data collection at Action Forensic

 

Case Study: Action Forensics

In Module 1, you were provided with information about the individuals employed by Action Forensics and their responsibilities. The company has the following employees:

  • There are eight trained forensic investigators who utilize forensic software to analyze the digital images on the SAN. These same investigators perform all hard drive imaging.
  • There is an evidence custodian who manages all evidence brought into Action Forensics protected storage area and maintains all chain-of-custody records for each evidence item.
  • There is a company President, who is responsible for acquiring business contacts and finding forensic work for the investigators.
  • There is a company secretary who handles all correspondence and phone calls.
  • There is a network technician who is responsible for maintaining the network, all computers, and the required software installations, patches, security updates, firewall configuration, and other network-related activities.
  • The company maintains a long-term consulting contract with a law firm to advise on legal issues.

In Module 2, you were provided with information about the two networks in use at Action Forensics.

There are two separate networks in the Action Forensics facility. The first network, shown here, is the administrative network used by the President, secretary, and network technician. Each device or computer has its own UPS for power backup.

Image showing the administrative network used by the president, secretary, and network technician of the fictitious company, Action Forensics

The second network, shown here, is the forensic network used by the eight forensic investigators, evidence custodian, and the network technician. Each device or computer has its own UPS for power backup. The only information allowed on the dedicated Internet connection is backup data from the SAN to the offsite data backup facility.

Image showing the forensic network used by the eight forensic investigators, evidence custodian, and the network technician of the fictitious company, Action Forensics

Every computer on both networks runs Windows 7. The eight forensic workstation computers are all dual boot and run Ubuntu Linux as well. All Windows systems have the current version of Microsoft Office.

Only the network technician has administrator rights on all computers on both networks.

In this activity, you will be devising a Data Collection plan that describes how information on each asset will be collected.

Develop a Data Collection plan that can be used to perform Data Collection on the different assets in the Action Forensics organization. As you develop this plan you will have to make decisions based on your understanding of how the company works. Do not worry that you are making a wrong decision. For example, you may decide the owner of the 50 TB SAN is the network technician instead of the evidence custodian, or even one or more of the forensic investigators. What is important is that you document your reason for choosing one owner over another.

Based on your understanding of Action Forensics, identify what might be collected in the following areas:

  • Listings of Enterprise Applications
  • Listings of Databases
  • Software Inventory
  • Hardware Inventory
  • System Diagrams
  • Technical Design Documents

For each item that you identify, decide which of the following specific items should be collected:

  • Asset Name
  • System Name
  • Description of the System
  • Hostnames or IP Address
  • Vendor, if any
  • System Owner
  • Technical Support Contact
  • Department that uses the Asset
  • Description of Data
  • Classification of Data
  • Number of Records

Decide which of the following specific items should be collected for an application:

  • Operating System
  • Database

Decide which of the following specific items should be collected for a database:

  • Operating System
  • Applications Supported

Remember, the object of this activity is to develop the Data Collection plan, not to actually collect the data. Keep in mind that someone who has never performed Data Collection should be able to follow your plan with a minimum of questions.

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more