logo

Information Security Management Assesment

   

Added on  2022-08-27

4 Pages716 Words42 Views
 | 
 | 
 | 
Running head: INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT
Name of the Student
Name of the University
Author Note
Information Security Management Assesment_1

1INFORMATION SECURITY MANAGEMENT
Discussions
In digital forensics, the collection is the first step towards the investigation of any
case. The collection means the collection of various files, images and hard disks that have
files stored on them. The collection is the gathering of various devices and the duplication of
the information those are digital for the aim of preservation of evidences those are digital and
that remains while the digital forensics is executed1. The files have various clues that are to
be identified by the investigators using the tools of digital forensics. I have gathered various
devices on which various files are present. The devices that I have collected include hard
disks, pen drives and the devices of mobile that contain sensitive information and those are
useful for the investigation. These informations are very important for the investigation. After
the collection of the devices are over, then I have duplicated the important information those
are present on the devices in order to perform the digital forensic2. The information that was
contained in the devices was mainly images those are used for the investigation of the crime.
I have seen that there were various devices that were encrypted and that will not open without
a password. Therefore, the IT professionals cracked the passwords of the devices and the
images were handed over to me.
After the collection of the information is over, the next stage in digital forensics is the
acquisition of data. I think this an important stage in digital forensics after the collection of
data. The acquisition of data is the procedure of making a forensic image from the media of
1 Bates, A., Pohly, D.J. and Butler, K.R., 2016. Secure and Trustworthy Provenance Collection for Digital
Forensics. In Digital Fingerprinting (pp. 141-176). Springer, New York, NY.
2 Soltani, S. and Seno, S.A.H., 2017, October. A survey on digital evidence collection and analysis. In 2017 7th
International Conference on Computer and Knowledge Engineering (ICCKE) (pp. 247-253). IEEE.
Information Security Management Assesment_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents