Part 1
The purpose of this discussion is to consider security control testing and its impact on the work center.
Instructions
During the security design and validation testing strategies, company servers can be impacted. Sometimes security testing must be done during work hours. What might we consider if security testing is done during peak-performance hours to determine if all is functioning properly? Has your work center ever experience performance issues? Consider a time when your work center may have been impacted by testing, maintenance or just research and write about the following briefly.
Using more than 50 words, research and write a post as a mock/fake email to the company employees talking about the security impact on the overall servers and system. What do you leave out and what do you leave in?
Overall impact
Difficulty
Time needed
Changes that could affect the performance
System risk
System criticality
Security test availability
Information sensitivity level
Likelihood of technical failure or misconfiguration
Part 2
Overview
The purpose of this discussion is to explore software options for investigating computer crimes.
Instructions
Investigations of computer crimes have specific and careful steps. One of those steps is making a bit level copy of the hard drive for instance. Research the topic and, in 50 words or more, talk about any one specific software application. Talk about its abilities being used in today's investigations and thereby used in court cases as credible. Are there any software packages out there so new or unreliable they are not recommended for computer investigations?
Sample Solution