Respond to these 2 statements

Respond to these 2 statements from my classmates. Need 1 reference for each response,,,Due 11/17 at 6pm

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

1. Te Cora Stephens said:

Computer forensics, as it relates to recovering from cyber-attacks is currently and will be a major factor for new companies to consider when creating jobs. The National Security Agency has plans to hire 3,000 specialists to combat the thousands of cyber-attacks every day in the United States, while the Department of Homeland Security is hiring about 1,000 more cyber security specialists (Bruzzes, n.d.). With that said, the level of expertise in analyzing cyber-attack and digital evidence is in demand. Having just basic education will not provide the necessary training and understanding needed to conduct cyber analysis of attack, and therefore certain certification will need to be in place.

Company policy on cyber-attacks would need to be reviewed, especially their policy on network intrusion, how to identify the method of intrusion, and procedures on recovering from an attack. Computer forensics allows for the basic knowledge of computers to meet forensic techniques and accomplishes a wide range of knowledge and specialties for analyst to focus on. More importantly, companies in the future might consider having certain experts in their cyber security unit to prevent cyber vulnerabilities or help identify risk associated with them. For example, the Certified Hacking Forensic Investigator (CHFI) could become a prerequisite for digital analyst with or without a degree in computer forensic. Hacking, as method of intrusion, is monitored by hacking tools. An analyst who specializes in hacking would be the expert in identifying these tools, and how these hacking tools were installed. Other areas call for expertise related to IDS, software and network vulnerabilities and malware. Documentation of these incidents related to cyber-attacks could eliminate the risk of being attacked by the same method. To insure this does not occur, computer forensics supports the method of reporting. In this case, an incident response document is created.

2.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Hayward Murray said:

Regarding risk management, many aspects of computer forensics can be incorporated in business continuity planning. In the event of a crisis, businesses want to quickly assess and respond to an event (cyber related, natural disaster, etc.) as to minimize financial loss, shorten any downtime, and also maintain trust and credibility with consumers (Harris, 2010). Fully acknowledging that no system or organization can be truly free of some risk, leveraging the technical expertise of computer forensic personnel to assist in crafting a solid business continuity plan is very important.

If for example, though digital forensic examination, it is determined that the initial incident response was not timely, containment and mitigation strategies were ineffective, and that the attacker was able to compromise and/or steal information via a known vulnerability. These data points can be compiled in a lessons learned report following the incident and computer forensic investigation. The findings from the report can be used to revise and update a perhaps stagnant business continuity plan; providing a stronger defensive cyber posture in the future (Brooks et al, 2007).

Risk management and business continuity planning applies to all business to include forensic laboratories as well. Watson & Jones (2013) point out that many digital forensic laboratories are contractually bound by multiple Service Level Agreements (SLAs), court dates, and strict timeliness of processing

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER