Q.4.2 Read the following scenario and then answer the questions that follow: You are the enterprise administrator in your organisation. You are responsible for all systems including servers, clients, databases, equipment, and mobile devices. Your ultimate goals are to ensure that the network infrastructure is highly available and secured. You have been alerted that a staff member, Employee A, has deleted and corrupted numerous files on the system that would have contributed to providing evidence in a scheduled disciplinary hearing against Employee A. The files deleted have an impact on the business continuity, audit trails, and data integrity. Q.4.2.1 Outline at least four steps you would have taken to secure the crime scene as soon as you were alerted of the incident. Q.4.2.2 Explain what Chain of Custody means and then provide an example of how you would establish such.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
Hi please answer the question, this is one question it's 4.2 as a whole. Thank you.
Q.4.2 Read the following scenario and then answer the questions that follow:
You are the enterprise administrator in your organisation. You are responsible for
all systems including servers, clients, databases, equipment, and mobile devices.
Your ultimate goals are to ensure that the network infrastructure is highly
available and secured. You have been alerted that a staff member, Employee A,
has deleted and corrupted numerous files on the system that would have
contributed to providing evidence in a scheduled disciplinary hearing against
Employee A. The files deleted have an impact on the business continuity, audit
trails, and data integrity.
Q.4.2.1 Outline at least four steps you would have taken to secure the crime
scene as soon as you were alerted of the incident.
Q.4.2.2 Explain what Chain of Custody means and then provide an example of
how you would establish such.
Transcribed Image Text:Q.4.2 Read the following scenario and then answer the questions that follow: You are the enterprise administrator in your organisation. You are responsible for all systems including servers, clients, databases, equipment, and mobile devices. Your ultimate goals are to ensure that the network infrastructure is highly available and secured. You have been alerted that a staff member, Employee A, has deleted and corrupted numerous files on the system that would have contributed to providing evidence in a scheduled disciplinary hearing against Employee A. The files deleted have an impact on the business continuity, audit trails, and data integrity. Q.4.2.1 Outline at least four steps you would have taken to secure the crime scene as soon as you were alerted of the incident. Q.4.2.2 Explain what Chain of Custody means and then provide an example of how you would establish such.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Fundamentals of managing system
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education