Course: Enterprise Risk Management
LATE SUBMISSION WILL NOT BE ACCEPTED BY PROF.
Due Date – 1 day
In the last week of class, we are going to complete a reflection activity.
This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book.
Items to include in the initial thread:
PEER DISCUSSION :
Digital forensics refers to experts’ process to identify, preserve, extract, and document information technology and computer digital evidence to be used as evidence in court cases. According to Simpson (2015), it can be defined as the applied science of looking for evidence from media such as servers, computers, networks, or mobile phones. Digital forensics usually assist the forensics groups with procedures and tools to solve the ever-increasing digital-related court cases.
Digital forensics usually assist investigators in digital cases to find and place the motive behind any crime and assist in identifying any prime suspects. Additionally, it aids in collecting any deleted data from digital media and validates them as genuine. Lastly, digital forensics can be used to prove the potential impact of any malicious digital activity on any client.
Digital forensics can be used in risk management by applying the following strategies. The first strategy is building a team with the right skills in digital forensics (Simpson, 2015). An organization should ensure that the employees working in the risk management department have the right technical skills to understand a company’s system and identify any potential risks. Those employees should have expertise in mathematics and computer science to analyze results observe patterns, and design data visualization to be used in risk identification.
Secondly, digital forensics analyses large data volumes in a bid to analyze and interpret risks. The tools used in forensics assist in reducing data threats, any security risks, and cyber risks. After data analysis, the tools used triggers alerts to the risk management team if any dangers come up. Any data comprise usually combated as quickly as it appears (Suffern, 2017).
Digital forensics sets ways in which authorized, and unauthorized digital data users can obtain it to ensure information falls in the right hands. The proper procedures are set to reduce and curb data theft. Any analyzed risks are usually monitored and evaluated continuously. The digital forensics team also ensure cloud backups, maintain data encryption, set authentication logs, and set electronic communication channels.
Simpson, L. (2015). Digital forensics research: The next ten years. Digital Investigation Journal, S64-S73.
Suffern, L. (2017). A Study of Current Trends in Database Forensics. Journal of digital forensic practice, 67-73.
———————————————————————————————————————————————-
“APA Format”
https://academicwriter.apa.org/6/
“NO PLAGIARISM” Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more