Use the organization and characteristics described in the Widget Factory Case Study, found in the Required Resources, as the context in which to complete this assessment.
PREPARATION
Research and evaluate the impact of physical and environmental security on incident response and computer forensics. Include both general implications and an evaluation of the existing Widget Factory environment. You should also consider areas of potential opportunity to improve the current setup.
DIRECTIONS
Part 1: In 6–8 pages, complete the following:
Discuss the impact that physical and environmental security practices have on effective forensics investigations.
Describe the role that both physical and logical security zones play in supporting effective forensics investigations.
Discuss how centralized versus decentralized physical and environmental security impacts the approach a forensics professional takes toward an investigation.
Evaluate potential areas of risk related to physical security presented in the case study.
ADDITIONAL REQUIREMENTS
Written communication: Written communication is free of errors that detract from the overall message.
APA formatting: Use current APA style and formatting guidelines.
Length: 6–8 pages, excluding the references page and the two screen captures from the Toolwire lab.
Font and font size: Times New Roman, 12-point.
Criteria Non-performance Basic Proficient Distinguished
Discuss the impact that physical and environmental security practices have on effective forensics investigations.
Does not discuss the impact that physical and environmental security practices have on effective forensics investigations. Discusses incompletely or inaccurately the impact that physical and environmental security practices have on effective forensics investigations. Discusses the impact that physical and environmental security practices have on effective forensics investigations. Discusses the impact that physical and environmental security practices on effective forensics investigations, including the use of supporting examples.
Describe the role that both physical and logical security zones play in supporting effective forensics investigations.
Does not describe the role that both physical and logical security zones play in supporting effective forensics investigations. Describes incompletely or inaccurately the role that both physical and logical security zones play in supporting effective forensics investigations. Describes the role that both physical and logical security zones play in supporting effective forensics investigations. Describes the role that both physical and logical security zones play in supporting effective forensics investigations, including the use of supporting examples.
Discuss how centralized versus decentralized physical and environmental security impacts the approach a forensics professional takes toward an investigation.
Does not discuss how centralized versus decentralized physical and environmental security impacts the approach a forensics professional takes toward an investigation. Discusses incompletely or inaccurately how centralized versus decentralized physical and environmental security impacts the approach a forensics professional takes toward an investigation. Discusses how centralized versus decentralized physical and environmental security impacts the approach a forensics professional takes toward an investigation. Discusses how centralized versus decentralized physical and environmental security impacts the approach a forensics professional takes toward an investigation, including the use of supporting examples.
Evaluate potential areas of risk related to physical security.
Does not evaluate potential areas of risk related to physical security. Evaluates incompletely or inaccurately potential areas of risk related to physical security. Evaluates potential areas of risk related to physical security. Evaluates potential areas of risk related to physical security, including the use of supporting examples.
Use forensics tools to identify and collect information from a remote location.
Does not use forensics tools to identify and collect information from a remote location. Incompletely or inaccurately uses forensics tools to identify and collect information from a remote location. Uses forensics tools to identify and collect information from a remote location. Uses forensics tools to identify and collect information from a remote location, including how these tools contribute to an incident investigation.
Exhibit proficiency in writing and use of APA (6th edition) style.
Does not exhibit proficiency in writing and use of APA (6th edition) style. Exhibits a low level of proficiency in writing and use of APA (6th edition) style. Exhibits proficiency in writing and use of APA (6th edition) style. Exhibits a high level of proficiency in writing and use of APA (6th edition) style.