Select Page

Florida State University Cyber Intelligence and Contemporary World Thesis Paper

Question Description

  • Phase 1- Identification and Preparation: This is the initial phase of the proposed forensic process and its purpose is to understand how the SCADA/ICS operates.
  • Phase 2- Identifying data sources: This phase is one of the most important phases of the process because it deals with identifying controllers of the system, the type of data can be collected, and where the data can be collected. Data sources need to be identified when any type of attack performed to the system. Needless to say, documentation of the actions taken during this phase is critical and essential for a forensically sound investigation.
  • Phase 3- Preservation, Prioritizing, and Collection: In this phase, the identified data is collected from the known locations, and it is preserved and prioritized for the purpose of repeatability and presentation. In this phase, it is also critical to collect volatile data as it might be destroyed easily. For instance, data can be collected from databases, computer workstation(s), PLC, etc.
  • 3 pages APA format

"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you "A" results."

Order Solution Now