Strayer SEC402 WK 7 Case Study 2 – Developing the Forensics, Continuity

SEC 402 WK 7 Case Study 2 – Developing the Forensics, Continuity, Incident Management, and Security Training

Write a five to seven (5-7) page paper in which you:
1. Consider that Data Security and Policy Assurance methods are important to the overall success
of IT and Corporate data security.
a. Determine how defined roles of technology, people, and processes are necessary to
ensure resource allocation for business continuity.
b. Explain how computer security policies and data retention policies help maintain user
expectations of levels of business continuity that could be achieved.
c. Determine how acceptable use policies, remote access policies, and email policies could
help minimize any anti-forensics efforts. Give an example with your response.
2. Suggest at least two (2) models that could be used to ensure business continuity and ensure the
integrity of corporate forensic efforts. Describe how these could be implemented.
3. Explain the essentials of defining a digital forensics process and provide two (2) examples on
how a forensic recovery and analysis plan could assist in improving the Recovery Time Objective
(RTO) as described in the first article.
4. Provide a step-by-step process that could be used to develop and sustain an enterprise continuity
process.