Risk Management on Computer Forensics

Risk Management on Computer Forensics

The report is based on the assessment of the security risks within a healthcare organization. The study is based on an internal risk that has affected the healthcare organization. One of the employees of the organization was accessing the confidential health information of patients with the help of password cracking software. Hence, a forensic investigator has been appointed for conducting a detailed plan for avoiding the risk scenario.

The study focuses on the impact of the theft of confidential information of patients within a health organization. An employee was stealing the information of patients for their own purposes, which is a major violation of the norms within the organization (Van Deursen, Buchanan & Duff, 2013). Based on the internal conduction of review based on the security risks, there would be some initial steps that should be followed for avoiding the risks that are incurred and thus prevent the organization from facing such forms of risks in the future.

2.1 Initial Steps of Investigation

Mobilise the Team of Incident Response – An incident response team should be deployed, which would collect the relevant evidence based on the technical breaches. The IT team should be able to deal with the cases related to breach of data, hacking and other kinds of issues.

Ensuring the Security of Systems – The team should perform security audits and thus isolate a certain section, which was affected. Hence, a thorough investigation should be performed based on the remedial action that would be taken.

Addressing of Legal Requirements – The rules and regulations should be properly followed as per the security policy of the organization during the conduction of investigation.

With the help of these kinds of techniques, it would be very much helpful for collecting information and evidence based on a deep level of research on the crime.

2.2 Issues of System Forensics

System forensics faces various issues based on technical, resource and legal based challenges within the study of the cases (Pichan, Lazarescu & Soh, 2015).

2.3 Impact of System Forensics

System forensics would play a major role in the investigation based on the case study. Forensics would help in the system of criminal justice by providing a thorough analysis based on physical evidence.

2.4 Impact of Sequestration

Sequestration plays a major role in forensics based on the participation of witnesses within the actual proceedings of courts and thus help in the legal proceedings of the case.

2.5 Use of Technology and Resources to Conduct Research

The usage of IT-based crime-solving techniques and IT professionals would be quite helpful in conducting a high level of research for various resources based on the conduction of crimes and gathering evidence for addressing the issues (Aminnezhad & Dehghantanha, 2014).

Based on the discussion, it could be concluded that the proper conduction of investigation by the forensic team would play a major role in dealing with the criminal case and thus secure the confidential data that was hacked.

Based on the drawn conclusions, it could be recommended that the team of forensic should make use of appropriate steps for detecting the prime source. They should implement the high level of security patches within the software in order to protect the data of the organization and thus ensure a healthy environment (Maras, 2015).

Aminnezhad, A., & Dehghantanha, A. (2014). A survey on privacy issues in digital forensics. International Journal of Cyber-Security and Digital Forensics (IJCSDF)3(4), 183-199.

Maras, M. H. (2015). Computer Forensics. Jones and Bartlett Learning.

Pichan, A., Lazarescu, M., & Soh, S. T. (2015). Cloud forensics: Technical challenges, solutions and comparative analysis. Digital Investigation13, 38-57.

Van Deursen, N., Buchanan, W. J., & Duff, A. (2013). Monitoring information security risks within health care. computers & security37, 31-45.

Related Assignment Samples

  • May 11, 2018 Personal Health Records: 699410
  • September 19, 2017 Sustainability and Portfolio Management:606010
  • June 2, 2018 Health Promotion about Obesity: 732044
  • January 31, 2018 Competency Demonstration Report : 665031
  • August 1, 2018 Paraphrasing: 767375
  • November 16, 2017 Strategic Marketing Plan : 647913
  • October 13, 2017 Management Accounting: 611473
  • October 13, 2017 Business Economics(Budgetery Planning): 633984
  • February 19, 2018 Human Rights Principles and Role of the ILO in Relation to China : 166409
  • January 31, 2018 Test on International Entrepreneurship : 601447
  • July 9, 2018 Healthcare Planning- Palmetto Health: 751361
  • October 23, 2017 Nursing (patient experience surveys) : 613980
  • February 17, 2018 Nursing Research : 665161
  • January 31, 2018 Undertake Project Work : 671730
  • November 17, 2017 Methodologies and Technical Solution for Bazaar Ceramics : 648293
  • March 10, 2018 PLC PROGRMMING -684183
  • June 22, 2018 Computer Systems and Networks: 734844
  • March 12, 2018 PLC Progrmming: 684183
  • December 26, 2017 Business Entrepreneurship : 647876
  • November 9, 2017 Critical Review of a Policy Document(Building Retirement Security) : 640032