Forensic Response and Investigation Plan
this is a scenario specific forensic response plan for the following major systems within the organization: materials requirements planning,
distribution, finance, and intellectual property/document management. This would include a forensic investigative response approach for suspected
security breach/unauthorized access of each of the four major systems previously listed, as well as a catastrophic failure of each system. Response
approaches should include people, equipment, tools/technologies, and other considerations. The plans should also include a priority classification
for the various aspect of the systems involved in the breach or failure, as well as a sequenced staging plan for when and how systems can be brought
online as part of the business continuity effort. You should identify the key forensic artifacts and how they can be preserved for investigation and
potential legal pursuit. Your artifacts must be preserved in a state that can provide proper attribution of the security breach or catastrophic
failure.
Forensic Response and Investigation Plan
this is a scenario specific forensic response plan for the following major systems within the organization: materials requirements planning,
distribution, finance, and intellectual property/document management. This would include a forensic investigative response approach for suspected
security breach/unauthorized access of each of the four major systems previously listed, as well as a catastrophic failure of each system. Response
approaches should include people, equipment, tools/technologies, and other considerations. The plans should also include a priority classification
for the various aspect of the systems involved in the breach or failure, as well as a sequenced staging plan for when and how systems can be brought
online as part of the business continuity effort. You should identify the key forensic artifacts and how they can be preserved for investigation and
potential legal pursuit. Your artifacts must be preserved in a state that can provide proper attribution of the security breach or catastrophic
failure.
Recent Comments