Digital Forensic Plan in Walmart Research Paper
Project Selection
The first step will be to select an organization as the target foryour Digital Forensics Plan. This organization will be used as the basisfor the individual assignment throughout the course and should conformto the following guidelines:
- Sufficient business scope: The selectedorganization should be in an industry where it would be reasonablyexpected to execute a Digital Forensics and Incident Response Plan.
- Domain knowledge: You should be familiarenough with the organization to allow focus on the Digital Forensics andIncident Response report planning and execution tasks.
Select an organization that fits these requirements, and submit yourproposal to your instructor before proceeding further with theassignments in the course. Approval should be sought within the firstseveral days of the course. Your instructor will tell you how to submitthis proposed Digital Forensics Plan and what notification will be givenfor project approval.
Assignment
For the assignments in this course, you will be developing a DigitalForensics & Incident Response Plan with the goal of responding toconcentrated attacks attempting to penetrate the organizational networkand system. The plan will address product and system vulnerabilities,and then reporting on those findings.
After receiving approval for your proposed project, complete the following tasks.
Task 1: Create a shell for the Digital Forensics Plan. As you proceedthrough each project phase, you will add content to each section of thefinal report document to gradually complete the final project delivery.All of this will be brought together in final form for the KeyAssignment. Appropriate research should be conducted to support theanalysis in your plan, and assumptions may be made when necessary.
Overall deliverables for the course are the following:
Week 1: Project Outline and Company Overview; Abstract
Week 2: Threats and Vulnerabilities
Week 3: Computer System Incidents
Week 4: Network and Internet Incidents; Conclusion
Week 5: Risk Mitigation Techniques and Plans
The project deliverables for Week 1 are the following:
- Submit the organization proposal to your instructor for approval.
- Create the Digital Forensics Plan shell with the following specifications:
- Use MS Word
- Title page
- Course number and name
- Project name
- Student name
- Date
- Section headings to be used for the table of contents (TOC)(create each heading on a new page with TBD as content, except forsections listed under “New content” below):
- General instructions for TOC:
- Use autogenerated TOC
- Separate pages
- Maximum of 3 levels deep
- Update the fields of TOC so it is up-to-date before submitting your project
- TOC section headings:
- Company Overview
- Abstract
- Table of Contents
- Analysis
- Threats and Vulnerabilities
- Computer System Incidents
- Network and Internet Incidents
- Conclusion
- Appendix A: Risk Mitigation Techniques and Plans
- References
- General instructions for TOC:
- New content
- Project requirements
- Provide the report’s TOC section headings, as stated above.
- Provide the Company Overview: This should be a briefdescription of the company (can be hypothetical) where the forensicsplan will be implemented. Include the general company business, companysize, location(s), and types of sensitive data being protected.
- Provide the Abstract, describing at a high level the following (this should be 200 words in length):
- Project requirements