American InterContinental University Cyber Security Discussion
Question Description
I’m working on a cyber security discussion question and need an explanation and answer to help me learn.
With the identification and preservation of the physical and digital evidence completed, the incident response team must now enter the data collection phase. Review the “Process of Digital Forensics” diagram at the following website.
During the data collection phase, the investigative team must collect volatile evidence first, and non-volatile second. In your discussions with your peers, make references to specific directories, files, file types, registry entries, and log files, which point to sources of the incident forensic evidence.
Perform research across the AIU Library, Google Scholar, and other credible research sites to find processes used by investigators to collect evidence related to volatile system memory and registry changes, and processes to collect evidence in non-volatile stand-alone systems. Answer the following questions (Ch. 14-15):
- How many evidentiary items of volatile and non-volatile nature did you find in your research and what might be their impact to the investigation?
- How you think investigators involved in cyber or digital forensics investigations use this information to prosecute their case?
- What investigative techniques would you use to analyze the users’ information, habits, and history for each program?
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."