ITF403 GP4 Jordan

ITF403 GP4 Jordan - Introduction to Computer Forensics 1...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Introduction to Computer Forensics 1 How to Perform a Security Evaluation Dionne Jordan Dave Lusion Ryan Porter Kenneth Leeper Tim Hendricks 8-13-2010 American InterContinental University
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Introduction to Computer Forensics 2 Abstract This is a training manual on how to perform a security evaluation through analysis of the current security and incident response plan and how the incident response team responds by following the security plan. It will provide documentation on security planning, incident response, and security policies, all clearly related to the forensic response capability.
Background image of page 2
Introduction to Computer Forensics 3 How to Perform a Security Evaluation Purpose Policies purpose is to identify a set of minimum security requirements that independent State and executive department has to meet in order to protect the availability, integrity and confidentiality of information owned by the state. The policy has to serve as the best practice for all of the State agencies. Every agencies may, based on individual business requirement and legal specific requirement like HIPAA, exceed requirement security expressed but at a minimum, must conform to security level by a policy. The policies apply to all electronically generated information that stored, receive, print, type and film. The policy should apply to all units in a business, unless an exception has been approved before.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 6

ITF403 GP4 Jordan - Introduction to Computer Forensics 1...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online