Transmitted data is encrypted,
d. The owner of data is defined and documented,
e. Computers are not left unsecured when processing or storing sensitive information,
f. Computer monitors will be positioned to eliminate viewing by unauthorized individuals, if unable to position monitors, a privacy screen must be used,
g. Sensitive information is placed out of sight when visitors are present,
h. Appropriate precautions are taken when sensitive information is discussed outside restricted areas,
i. Sensitive information is not left in the open or unattended, even temporarily. Sensitive information must be secured at every step in the process until destroyed. Sensitive material is stored in a secure safe or locked cabinet, and material is secured each evening or during any lunch periods or breaks,
j. Data is stored in a media storage vault or library that has restricted access and is environmentally protected, based on the highest FIPS 199 security category of the information recorded on the media.
(2) For moderate -, and high-impact systems, VA must employ automated
mechanisms to restrict access to media storage areas where a significant volume of media is stored and to audit access attempts and access…
studies undergraduate will not only have a solid understanding of the core skills and communication practices, but also the necessary knowledge of how to apply them to a field that best suits them. However, according to NYU’s McGhee Division, there is a growing need for professionals who can keep up with rapidly changing technology in the workplace (New York University, 2008). So, during my tenure at the University of North Carolina Wilmington (UNCW), I plan to concentrate my studies in…
I am the information security specialist for a company that develops software X. Software X is the leading operating system in mobile devices. Unfortunately, our company believes Mr. McBride, a former employee stole product X source code for financial gain. As such, I have been tasked with leading the forensic investigation in this matter.
During an investigation is imperative that potential witnesses are questioned to gather essential information needed in the…
1. Computer hardware: include computer machines, hard-drive or equipment on which data can be stored and recorded. It also consists a variety of other devices such as servers that help the IS do their tasks efficiently.
2. Operating system platforms: this is what runs the hardware devices, the software is used to act as an interface for the user and manage the incoming date and output. Currently, this sector is dominated by Windows operating systems, and servers by UNIX operating systems or…
A graphics card is the hardware for a computer that produces the images that we see on the computer monitor. The Cards main job is to decide on how the pixels on the screen will be used to create the image then information that is creates is sent to the monitor through a cable. The graphics card has four main parts that it uses to complete the tasks. These are the motherboard where the power and data is connected through a connector, the processor this tells it how to use each…
investigation, the first pro-active step is that of acquisition. However, the method used for data acquisition by a forensics investigator plays a major role in influencing the admissibility of electronic evidence to be used in a court or law, or the reliability of any other relevant information required when dealing with computer forensic cases at the organizational level (Dykstra & Sherman, 2012). Different data acquisition techniques allow for the recovery of electronic data from devices like…
The complete computer is made up of CPU (Central Processing Unit), Memory and Related Electronics, All the peripheral devices connected to it and its operating system. Computer Systems will fall into 2 categories: Clients and Servers.
Any computer system needs both hardware and software components to work together to help the computer system to work.
Hardware - Is a physical component that contributes to the build of a computer system. For example… Processor, Main memory,…
Multiferroic Magnetoelectric Nanostructures for Novel Device Application is a published research paper by members of the Materials Research Society. This discourse community’s purpose is to inform engineers, usually electrical engineers, about new electronic materials and their applications. In this article, three Northeastern University and one Pennsylvania State University academics describe the use of magnetoelectric nanostructures in modern technology. The technology industry is quickly…
Q1.Explain how the optical disk storage facility operates?
Optical disk storage is an advancement of the floppy disk. The optical disk storage also called optical media is shinny and both recording surfaces are protected by two plastic plates which make it less exposed to dust and contamination. Unlike the floppy disks that store up to 1.44 of data, optical disks storages can store up to 650MB of data. They are 5.25 inches (12cm) and have a high storage density. Optical disks storage uses a high…
completion of an operation or to signal a variety of error conditions.
Hardware failure Generated by a failure such as power failure or memory parity error.
Source: William Stallings (Date of access: 16 October 2017)
1.6 Memory Hierarchy
It is a concept that is used to describe different ways in which a computer handles information.
Memory hierarchy can be used to separate storage devices into a hierarchy depending on response time. The hierarchy levels can be distinguished by their capacity,…