logo

Assignment on Digital Forensic

   

Added on  2022-09-12

6 Pages962 Words17 Views
 | 
 | 
 | 
Running head: DIGITAL FORENSIC
Forensic and incident response
Name of the Student
Name of the University
Author’s Note
Assignment on Digital Forensic_1

1
DIGITAL FORENSIC
Table of Contents
Explanation of method...............................................................................................................2
Critical evaluation of method.....................................................................................................2
Conclusion..................................................................................................................................4
References..................................................................................................................................5
Assignment on Digital Forensic_2

2
DIGITAL FORENSIC
Explanation of method
Digital forensic defines as a part of computer forensic which concentrates only the
determination of the digital components of the business whether there exists any illegal action
carried by the organization or any kind of cyber-attacks (Casey, Back and Barnum 2015). To
continue this kind of forensic, it requires to remain the skills of the IT professionals by which
they can identify the threats of the hard drives or any computer based devices including
malware or hacking etc. Apart from this, the incident response is a set of process of
identifying the incidents. In this process, the communication should be clear or accessible
which is conducted between the parties identified by incident response team and the manager.
This process can be executed through few steps including preparing, identifying,
containing, remediating as well as incident recovery and also reporting with perfect
communication (Agarwal and Kothari 2015). Through these steps, most of the organizations
can obtain the benefits from this DFIR process.
Critical evaluation of method
The evaluation of the digital forensic and incident response proceeds through six steps
for identifying the threats and risks for the organization. Formally, the working principle of
the incident response may provide the results of identification of threats of computer devices
or other hard drives (Montasari 2016). Before starting the process of incident response, the
organizations have to prepare the incident response team along with the managers for
achieving the identification of risks. After happening of preparing phase, the identification
phase deploys to detect the risk occurring within the organization. During the containing
phase, the incident response manager needs to check the containing of the risks so that it
cannot spread further throughout the systems (Ab Rahman and Choo 2015). After finishing
this phase, the team employs within a phase relating with the correction of the threats. After
Assignment on Digital Forensic_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents