{"id":26936,"date":"2022-08-04T01:56:32","date_gmt":"2022-08-04T01:56:32","guid":{"rendered":"https:\/\/nursingstudybay.com\/?p=26936"},"modified":"2022-08-04T01:56:42","modified_gmt":"2022-08-04T01:56:42","slug":"create-a-policy-and-processes","status":"publish","type":"post","link":"https:\/\/www.essaybishops.com\/essays\/create-a-policy-and-processes\/","title":{"rendered":"Create a policy and processes"},"content":{"rendered":"<p>Topic:<br \/>\ncreate a policy and processes<br \/>\nAssignment 4:<\/p>\n<p>You have been hired to perform digital investigations and forensics analysis for a company. You find that no policies, processes, or procedures are currently in place. Do an Internet search to find information, and then create a policy and processes document to provide the structure necessary for your lab environment.<\/p>\n<p>After answering the questions, save the file with LastnameFirstname_Assignment4 (eg., JohnSmith_Assignment4) and submit it right back here under Assignment 4 for grading.<\/p>\n<p>Assignments are due by 11:59 p.m. Eastern Time on Sunday of Week 4.<\/p>\n<p>&#8212;-<\/p>\n<p>Structures Needed to Create Policy and Process Document for a Forensic Lab<\/p>\n<p>Policy and process are detailed documents that may come in handy for organization\u2019s compliance. They are important because they help provide structure for meetings, analysis and reporting by critically allowing organizations to identify and define challenges. They also work to critically work around this challenges, mitigate them from taking place and even overcome them. Cox (2016) identifies that policies and procedures are important in that they help to handle policies before they happen. They are critical in promoting conflict resolution, they help organizations avoid costly incidences and promote due diligence. As such, they establish a standardized procedure for evaluation; preventing financial and legal risk for companies. Policies and processes also come in handy in shaping company\u2019s culture by defining its internal processes.<br \/>\nThe following policy and process document manifests through Rational Choice Policy Making Model. The rational choice model identifies that individual choices are made of the basis of policy where, the company assesses its best interest, cooperates with other stakeholders to create an elaborate policy and process document (Harries, 2012). The forensic policy is for the hypothetical company XYZ, XYZ features a very high value Microsoft SQL database which uses a weak public server, several firewalls, and Microsoft System Center networks. The company additionally uses the free Suricata Network Intrusion Detection System. XYZ considers any act of breeching through this systems worthy of prosecution. So far XYZ has never encountered a problem or forced and unauthorized intrusion within its servers. But there is always a risk due to its large customer, employee and third party temporary gig workers with strict periodic access to the servers.<br \/>\nThe following Forensic Policy Document was drafted pending implementation. The document aims to mitigate XYZ servers from breech.<br \/>\nForensic Policy and Process<br \/>\n1.\tAll forms of access to Microsoft SQL need to be monitored and logged. This is for the benefit of accountability and strictly controls the number of people who access the server logging them by their purpose of access.<br \/>\n2.\tAccess codes, logs and administration logs into Microsoft SQL database will be well-maintained for a period not more than 3 months. Employees will need to personally present their log in schedules, and activities at the end of this period and be provided new ones pending approval of their activities.<br \/>\n3.\tFirewall and Snort will be kept for less than six months<br \/>\n4.\tMicrosoft System Center network logs will also be kept for a duration less than six months.<br \/>\n5.\tAll access and activity will be monitored and reported on a monthly basis<br \/>\n6.\tRouters logs will be changed after every six months.<br \/>\n7.\tThere will be a network speed test and anomaly test at the end of every week. This is aimed at identifying congestion and is aimed at detecting aspects when the network looses traffic to establish periods where it is most vulnerable.<br \/>\n8.\tEmployees will be trained regularly and expected to master the policies.<br \/>\nThe above policy will come in handy and help evaluate the network security periodically. It will also log in all forms of access as such, be easier to identify the breaches that may occur. This will also work to sustain an employee culture of accountability and compliance creating an all round respect for company activity.<\/p>\n<p>References<br \/>\nCox. (2016). Master Writing Policies, Procedures, Processes, and Work Instructions. Retrieved from https:\/\/www.smartsheet.com\/company-policies-procedures#:~:text=They%20provide%20an%20umbrella%20under,transformation%20of%20inputs%20into%20outputs.%E2%80%9D<br \/>\nHarries. (2012). Bridging policy and delivery with knowledge: the case for intervention. In in Records Management and Knowledge Mobilisation, 2012.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Topic: create a policy and processes Assignment 4: You have been hired to perform digital investigations and forensics analysis for a company. You find that no policies, processes, or procedures\u2026<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1040],"tags":[1174],"class_list":["post-26936","post","type-post","status-publish","format-standard","hentry","category-in-a-page-paper","tag-create-a-policy-and-processes"],"_links":{"self":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/26936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/comments?post=26936"}],"version-history":[{"count":2,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/26936\/revisions"}],"predecessor-version":[{"id":26942,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/26936\/revisions\/26942"}],"wp:attachment":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/media?parent=26936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/categories?post=26936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/tags?post=26936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}