Computer Forensics Investigation

397 words | 2 page(s)

In the modern world, computers have become a core component of the business process. The success of any businesses, such as Target Corporation, depends on the secure use of its computers and data protection systems. However, when external unauthorized access is made to a company’s computer system, valuable data from the business process may be in jeopardy. Therefore, companies ought to employ incident response teams that ensure the security events are handled in an effective manner (Ruefle et al., 2014). The role of the incident response team in a security situation is to find the best way forward to deal with the negative effect of the security incident on all aspects of the business. The incident response team often includes personnel from IT, legal, human resources, and other sectors of the company to gain a full perspective on how to mitigate the adverse effects of the attack.

Target Corporation may face a breach of security to their data through a cyber-attack. The incident response team ought to respond by performing the following activities. First, the incident response team should assess the damage done. Secondly, the response team ought to invite computer forensic investigators to perform professional tasks towards tracing the identity of the attacker. Third, the forensic experts ought to provide the company with an analysis of their findings for them to take more precautionary measures against future attacks and to deal with issues regarding the current attack in a legal manner.

puzzles puzzles
Your 20% discount here.

Use your promo and get a custom paper on
"Computer Forensics Investigation".

Order Now
Promocode: custom20

The intrusion can lead to illegal access to significant company information. Computer forensic investigations are very specific and detailed (Steinke et al., 2015). Evidence gained from the investigation is suitable for use in the court of law. However, the company carries liability when it has neglected to sufficiently protect their computer systems, thus, placing significant personal customer information at risk. The customers can sue the company on the ground of neglect. Otherwise, necessary steps ought to be taken from different angles to ensure information concerning all process of the company’s business is secured.

    References
  • Ruefle, R., Dorofee, A., Mundie, D., Householder, A. D., Murray, M., & Perl, S. J. (January 01, 2014). computer security incident response team development and evolution. IEEE Security & Privacy, 12(5), 16-26.
  • Steinke, J., Bolunmez, B., Fletcher, L., Wang, V., Tomassetti, A. J., Repchick, K. M., Zaccaro, S. J., … Tetrick, L. E. (January 01, 2015). Improving cybersecurity incident response team effectiveness using teams-based research. IEEE Security & Privacy, 13(4), 20-29.

puzzles puzzles
Attract Only the Top Grades

Have a team of vetted experts take you to the top, with professionally written papers in every area of study.

Order Now