Chapter 8 , The book is managment information systems 14th 8-2 Define computer f
ID: 444569 • Letter: C
Question
Chapter 8 ,
The book is managment information systems 14th
8-2 Define computer forensics and explain its purpose. What problems are dealt with by computer
forensics? Within the organization, who are the key players that should be concerned with this topic?
8-3 What are the components of an organizational framework for security and control?
· Define general controls and describe each type of general control.
· Define application controls and describe each type of application control.
· Describe the function of risk assessment and explain how it is conducted for information
systems.
· Define and describe the following: security policy, acceptable use policy, and identity
management.
· Explain how information systems auditing promotes security and control.
8-4 What are the most important tools and technologies for safeguarding information resources?
· Name and describe three authentication methods.
· Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting
security.
· Explain how encryption protects information.
· Describe the role of encryption and digital certificates in a public key infrastructure.
· Distinguish between disaster recovery planning and business continuity planning.
· Identify and describe the security problems posed by cloud computing.
· Describe measures for improving software quality and reliability.
Explanation / Answer
Forensic is the science of collection, preservation, and analysis of scientific evidence during the course of an investigation. Computer forensics is the process of collection, preservation, and analysis of evidence from a particular computing device. The purpose of computer forensics is to conduct an investigation to find evidence. The evidence so found is used in the proceedings of the litigation process.
Problems dealt with by computer forensic are - (i) preservation of data (ii) recovery of deleted data (iii) reconstruction of events (iv) correlation of data found on multiple hard disk drives
Key players within the organization who should be concerned: managers and administrators of information systems and networks, chief technology officer, chief financial officer (as computer forensics can help an organization save money).