Course: Enterprise Risk Management
LATE SUBMISSION WILL NOT BE ACCEPTED BY PROF.
Due Date – 1 day
In the last week of class, we are going to complete a reflection activity.
This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book.
Items to include in the initial thread:
- “Interesting Assignments” – What were some of the more interesting assignments to you?
- “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings” (I ATTACHED ONE OF THE PEER DISCUSSION FOR REFERENCE IN THE BELOW)
- “Perspective” – How has this course changed your perspective?
- “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others?
PEER DISCUSSION :
Digital forensics refers to experts’ process to identify, preserve, extract, and document information technology and computer digital evidence to be used as evidence in court cases. According to Simpson (2015), it can be defined as the applied science of looking for evidence from media such as servers, computers, networks, or mobile phones. Digital forensics usually assist the forensics groups with procedures and tools to solve the ever-increasing digital-related court cases.
Digital forensics usually assist investigators in digital cases to find and place the motive behind any crime and assist in identifying any prime suspects. Additionally, it aids in collecting any deleted data from digital media and validates them as genuine. Lastly, digital forensics can be used to prove the potential impact of any malicious digital activity on any client.
Digital forensics can be used in risk management by applying the following strategies. The first strategy is building a team with the right skills in digital forensics (Simpson, 2015). An organization should ensure that the employees working in the risk management department have the right technical skills to understand a company’s system and identify any potential risks. Those employees should have expertise in mathematics and computer science to analyze results observe patterns, and design data visualization to be used in risk identification.
Secondly, digital forensics analyses large data volumes in a bid to analyze and interpret risks. The tools used in forensics assist in reducing data threats, any security risks, and cyber risks. After data analysis, the tools used triggers alerts to the risk management team if any dangers come up. Any data comprise usually combated as quickly as it appears (Suffern, 2017).
Digital forensics sets ways in which authorized, and unauthorized digital data users can obtain it to ensure information falls in the right hands. The proper procedures are set to reduce and curb data theft. Any analyzed risks are usually monitored and evaluated continuously. The digital forensics team also ensure cloud backups, maintain data encryption, set authentication logs, and set electronic communication channels.
Simpson, L. (2015). Digital forensics research: The next ten years. Digital Investigation Journal, S64-S73.
Suffern, L. (2017). A Study of Current Trends in Database Forensics. Journal of digital forensic practice, 67-73.
Schiller, F., & Prpich, G. (2014). Learning to organise risk management in organisations: what future for enterprise risk management? Journal of Risk Research, 17(8), 999–1017. https://doi.org/10.1080/13669877.2013.841725
“NO PLAGIARISM” Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.