Assume you are a first responder to an incident involving a report of suspected misuse from an internal individual that occurred at your organization. You have been assigned to investigate this report. Using a digital forensics methodology, create a visual workflow diagram that shows what steps you would take in this investigation.
The following additional resources will provide you with context and explain the challenges and methods associated with ethical and legal practices in Information Security:
Information Security Laws, Investigations and Ethics (TechTarget) (Links to an external site.)
Legal Threats Rise, This New Report Aims to Guide Ethical Hackers (ZDNet)<span class=”screenreader-only” style=”box-sizing: border-box;”><span> </span>(Links to an external site.)</span>’>As Legal Threats Rise, This New Report Aims to Guide Ethical Hackers (ZDNet) (Links to an external site.)
Top Podcast Episodes – Inside Out Security (Varonis) (Links to an external site.)
Cybersecurity Legislation 2018 (National Conference of State Legislatures)


0 comments