The forensic analysis of a computer would have to be initiated with the physical isolation of the device and making a copy of the storage data of the device. The copy of the data is examined and unallocated disk space that helps in obtaining copies of deleted, encrypted and corrupted files. Then reason for adopting this method could be established on the grounds of the acceptance of these methods on ethical basis (Bailey, 2015).
It is always necessary to review the unallocated disk space and slack space since logical file structure review precedents indicate that when potential evidence like the laptop is found, the address on its hard drive should be recorded (Iden & Eikebrokk, 2014). The logical addressing scheme considered in this review also includes the mandatory guidelines for recording the physical address of any form of evidence that also includes references to sector and cluster addresses.
The first entry in the log book would be to record the system time and date. This process has to be initiated carefully since PC operating systems are not able to keep an accurate record of time. Therefore the time on the computer could drift thereby it could be accomplished through interpreting the margin of this drift so that the file access times could be obtained (Jabbouri, et al., 2016). This process was also characterized by recording the time and date as obtained through the operating system reports and comparing it with data from reliable source which can be identified from the time sync server. The final stage in this event was to document the timeserver which was used.
The IT security policy would include legal elements such as Information Security Policy, E-mail rules, E-mail filtering, Consequences of IT service abuse, Retrieval of Employee E-mail and Relevant Legislations. These documents would be provided to employees in the form of documented reports of these legal aspects covered by the policy of the organization. Furthermore these documents would have to be associated with substantial support from the web pages facilitated by ICT Management alongside improving the regulations on IT security (Shibambu & Ditsa, 2017).
As a system administrator in the college, I have to ensure a formal impression of the legal implications of my job since it would help me in aligning organizational performance with ethical and legal responsibilities. The legal aspects pertaining to Freedom of Information, Privacy and Electronic Communications Regulations, Copyrights, Designs and Patents, Equality, Computer Misuse, Official Secrets would have a potential impact on my job with respect to computer security. The actions which I would take in order to implement these regulations would involve a holistic approach wherein I would be able to learn the comprehensive aspects of regulations and laws associated with computer security in a professional environment (Jabbouri, et al., 2016). Documentation of system errors and frequent maintenance of hardware would be the formal priority of my job as a system administrator. The use of smartphones and e-learning methods in the college would also have to be included as a significant dimension in my job role. I would ensure to maintain a formal log book for the security of individual departments in the college alongside complying with the legal aspect related to computer privacy and security.
Bailey, S. M. (2015). Information technology service management frameworks: A study of it processes and their relationship to the Information Technology Infrastructure Library (ITIL) (Doctoral dissertation, Capella University).
Iden, J., & Eikebrokk, T. R. (2014). Exploring the relationship between information technology infrastructure library and process management: theory development and empirical testing. Knowledge and Process Management, 21(4), 292-306.
Jabbouri, N. I., Siron, R., Zahari, I., & Khalid, M. (2016). Impact of Information Technology Infrastructure on Innovation Performance: An Empirical Study on Private Universities In Iraq. Procedia Economics and Finance, 39, 861-869.
Shibambu, A., & Ditsa, G. (2017). Analysis of Information Technology Infrastructure Towards Improving Services in the Public Sector. Journal of Information Technology and Economic Development, 8(1), 33.