Computer Forensic (Essay question)
Adam has been called upon to investigate a hacking incident on
one of the devices in an organization. The organization suspects
the involvement of an insider accomplice in the attack. Upon
accessing the incident scene, Adam secures the physical area and
registers the scene using visual media. He shuts the system down by
pulling the power plug so that he does not disturb the system in
any way. He labels all cables and connectors prior to disconnecting
any of them.
(a) Explain what would be the next sequence of events to
forensically rules of acquire evidences in this case.
(b) Demonstrate basic framework of Information security risk
life cycle steps with the help of a neat diagram.
Computer Forensic (Essay question) Adam has been called upon to investigate a hacking incident on one of the devices in
-
- Posts: 43759
- Joined: Sat Aug 07, 2021 7:38 am