Presentation is loading. Please wait.

Presentation is loading. Please wait.

By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics.

Similar presentations


Presentation on theme: "By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics."— Presentation transcript:

1 By: Megan Guild and Lauren Moore

2 Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics Our Recommendation Details Examples Companies Zone Alarm Digital Medix

3 About Mountain Stream Co.  High end bottled water company  Use the purest water from the springs located in Rocky Mountains.  Known for their refreshingly clean taste and earth-friendly production process.  Headed towards becoming the market leader in bottled water.

4 Questions They Have  How do we go about finding the original tax documents that were created?  Because our company has several departments and nearly 50 computers, how much would computer security and forensics services cost?  Do we need to outsource the computer security and forensics search to a specialized company?

5 Questions Cont….  During the computer search process, would the speed and efficiency of our day to day operations be affected significantly?  What are some firms that we could contact to help us in this situation?

6 Computer Security  Used to protect information from corruption or theft.  Hardware that imposes rules.  Example http- Unsecure site https- Secure site

7 Computer Security Cont….  Complex and in-depth Compartmentalize  Security architecture Plan  Important companies and individuals Facebook/Myspace?

8 Computer Forensics  Definition The Science of locating, extracting and analyzing types of data from different devices, which specialists then interpret to serve as legal evidence.  Deleting data Once something is saved onto a computer it is difficult to dispose of it.

9 Common Situations  Unauthorized disclosure of corporate data (by accident or design)  Employee internet abuse  Damage assessment and analysis  Industrial espionage  Criminal fraud and deception cases  More general criminal cases

10 Computer Forensics Advantages  Provides support  Helps companies recover loss.  Preservation of evidence  Images  Non Investigative purposes

11 Computer Forensics Disadvantages  Privacy concern  Data lost in recovery process  Costly  Time consuming  Computer Forensics by disk labs Computer Forensics by disk labs

12 Computer Forensic Companies  Total Recall Pricing: $897 per drive Mountain Stream co. $44, 850  Digital Medix Pricing: $299-$749 per drive  Other options

13 Computer Security Companies  McAfee Pricing: $52 a computer a year ○ Mountain Stream: $2,600  Zone Alarm Pricing: $30 a computer a year ○ Mountain Stream: $1,500  Hiring your own team

14 Our Recommendations  Computer Security Zone Alarm ○ Apply to all computers  Computer Forensics Digital Medix ○ Only apply to few computers

15 Sources  http://www.isaca.org/Template.cfm?Section=Home&CONTENTID=2778 3&TEMPLATE=/ContentManagement/ContentDisplay.cfm http://www.isaca.org/Template.cfm?Section=Home&CONTENTID=2778 3&TEMPLATE=/ContentManagement/ContentDisplay.cfm  http://en.wikipedia.org/wiki/Computer_security http://en.wikipedia.org/wiki/Computer_security  http://www.wired.com/politics/security/news/2008/01/facebook_phish http://www.wired.com/politics/security/news/2008/01/facebook_phish  http://www.computerforensics1.com/computer-forensic- disadvantage.html http://www.computerforensics1.com/computer-forensic- disadvantage.html  http://www.computerforensics1.com/computer-forensic-advantage.html http://www.computerforensics1.com/computer-forensic-advantage.html  http://websearch.about.com/od/dailywebsearchtips/qt/dnt0513.htm http://websearch.about.com/od/dailywebsearchtips/qt/dnt0513.htm  http://www.computerforensicsworld.com/modules.php?name=FAQ&myf aq=yes&id_cat=1&categories=Basic+Questions http://www.computerforensicsworld.com/modules.php?name=FAQ&myf aq=yes&id_cat=1&categories=Basic+Questions  http://www.networkworld.com/columnists/2007/071707- johnson.html?fsrc=rss-security http://www.networkworld.com/columnists/2007/071707- johnson.html?fsrc=rss-security  http://shop.mcafee.com/Default.aspx?pid=HOME&CID=MFE-1008 http://shop.mcafee.com/Default.aspx?pid=HOME&CID=MFE-1008  http://www.totalrecall.com/data_recovery_estimate.html http://www.totalrecall.com/data_recovery_estimate.html Video  http://www.youtube.com/watch?v=GVbV_onexrM http://www.youtube.com/watch?v=GVbV_onexrM

16 Questions?


Download ppt "By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics."

Similar presentations


Ads by Google