ISSC451 W7: Digital Forensics and Information Security| Discussion Peer Response| Clare

Description

Hi everyone!Preserving the verifiable integrity of digital evidence is very important in forensic investigations to ensure that data remains un tampered with throughout the investigation process. In order to achieve this, there are a few practices investigators need to comply with:Maintain proper Documentation and Chain of Custody.Encrypting Data and implementing Digital signatures on evidence.Using proper Forensic Tools for data collection.If any one of these practices is not followed thoroughly, an analyst should be able to detect whether or not the original evidence was modified. If the proper tools are in place, anyone should be able to look through log records to see what was changed. According to Check point security, “a Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet. A firewall’s main purpose is to allow non-threatening traffic in and to keep dangerous traffic out.” (Checkpoint, 2023) Some limitations a firewall has is that it doesn’t necessarily prevent your users from accessing the data or information from malicious websites.Bferrite. (2023, September 7). What is a Firewall? the different types of firewalls. Check Point Software. https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/#:~:text=A%20Firewall%20is%20a%20network,network%20and%20the%20public%20Internet.

Don't use plagiarized sources. Get Your Custom Assignment on
ISSC451 W7: Digital Forensics and Information Security| Discussion Peer Response| Clare
From as Little as $13/Page