Phase 1 Individual Project
Electronic management plan refers to plans used to develop documents used by organization owners to manage their electronic components. For any electronic organization to survive in the market, it needs to have a well implemented and documented management plan . The plan owner must review the document regularly to have a clear understanding of the design, materials, qualification methods, capabilities, configuration control, identify potential risks, and mitigate the risks if possible.
Purpose and importance of an Electronics Management Plan
Electronic management plan ensures the documents are properly filled in a dependable manner. In addition, this is very important since the organization can be able to retrieve required information in the shortest time possible.
Most of the well-known electronic organizations in the whole world either because of their high quality electronic products e.g. mobile phones, computers, fridge etc. has record management systems that helps them to protect their data from disasters hence giving them strong protective mechanism against risks. Any electronic company that adheres to its management plan will always be secure from risks which is an added advantage over its competitors.
Electronic management plan helps the organization classify its document as records, and each document is assigned a retention period after which it will be used to store another record. This is done according to the business classification scheme.
Brief description of the organization where the Electronics Management Plan will be implemented
Samsung Electronics Company is a Korea-based company that was created in the year 1969 as a division of the mammoth Korean chaebol Samsung Group. Its headquarters are located in Yeongtong District in South Korea and its currently managing 200 subsidiaries with about 308 million employees. It mainly specialized in manufacturing and distribution of electronic products including mobile phones, computers, fridges etc. It operates its business via three segments i.e. Consumer electronics (CE) segment, Information Technology and Mobile Communications (IM) segment, and Device Solutions (DS) segment.
Consumer electronics (CE) segment: this segment is mainly involved in manufacturing of color Televisions (TVs), printers, refrigerators, monitors, air conditioners, laundry machines and others.
Information Technology and Mobile Communications (IM) segment: this is a Samsung’s electronic company segment involved in manufacturing of handhold phones, digital cameras, computers, network systems and others.
Device Solutions (DS) Segment: this is the third and final segment in Samsung Electronics Co. involved in manufacturing of semiconductor and display parts such as Dynamic Random Access Memories (DRAMs), thin film transistor-liquid crystal displays (TFT-LCDs), flashes and others. The company distributes the products within the overseas and domestic markets.
Type of investigation that the organization is conducting
The company is currently conducting an investigation about its product quality. One of its product, Samsung Galaxy Note 7 did not only bring the company a big loss but also reduced its good reputation after its battery fired and made the device to explode. Though the company’s president claims to have come with the solutions, the company is still investigating its manufacturing problem that caused the battery to overheat.
Potential types of media that could be involved in the case
Batteries sourced from Samsung SDI: they found out that these batteries had no enough room between the heated protective pouch seal around the battery and its internal components. This resulted to crimping and weakening of the electrodes inside the battery and finally cause short circuiting.
Batteries sourced form Amperex Technology Limited: the investigation showed that some insulation tapes and batteries had sharp protrusions were missing inside the battery cell. This led to the damage of the separator between the cathode and anode. In additions, this risk was catalyzed by the thin separators which were vulnerable to damage and short circuiting.
Different architecture of seized media depending on the use or industry
An architecture refers to both the process and product planning. They includes animated architecture, spatial media architecture, money architecture, participatory architecture, and trends and prototypes architecture.
Based on the above discussion, it is clear that electronic management plan is an important document kept by the organization to help it manage its electronic components. Due to its many importance to its company, any company that runs without good electronic management plan will be at high risk of failure since it will have not have a clear understanding of its components and how to control them.
How the forensics team will be preserving and protecting its data
Forensic team performs their work inside a crime or forensic laboratory. This is where they compare and interpret the evidence retrieved from crime scene by investigators. Under certain circumstances, one or more forensic scientists may be required to visit the crime scene if the methods or techniques surrounding the collection or preservation of the evidence are still in question.
Below are some of the method that will be used by the forensic team to preserve and protect its data
Data is Forensic team will be ensuring that all storage Medias that contains the most sensitive data are concealed form disasters. This will involve locking the serves in a restricted area where they are secure from theft or damage. Every employee must be informed that the data is protected and no authorized member is allowed to visit the serve room.
This is usually the initial step taken by forensic team to protect the data. In situations where a crime has occurred and investigation need to be done by the team, physical protection will involve protecting the crime scene by all means possible to ensure the evidence is not altered. The first forensic team member or investigator to arrive at the crime scene should ensure no an authorized member enters the crime scene before the evidence is corrected and documented ready for analysis. This is done using the security personnel to prevent people from entering the crime scene or taking photos of the evidence if the evidence is volatile and can be lost after some time.
The forensic team has worked tirelessly to ensure the laws on safeguarding privacy of personal data are passed to organizations. The law require every organization to comply with computer security practices. If it is detected that there are incidents affecting important or sensitive data, e.g. the organization has implemented some computer forensic capabilities in its working environment, it will be able to show how it has followed the set security policies to avoid unlawful regulatory audits.
The forensic team enforces three areas of law that are related to computer security. They demands that these law should be well known to every individuals and organization. The first law is found in the U.S Constitution i.e. the Forth Amendments 5. It protects personals against unreasonable search and/or seizure. Although they were implemented before the misuse of computers, the law applies to how computer forensics is conducted.
Contingency or backup protections
Backup protection involves keeping a copy of the data to avoid destroying the original data. In computer forensic, the forensic team will first prepare a disk image which will be used for analysis instead of using the original evidence. This ensures safety of the evidence since even if the disk image is damaged during the analysis, the original evidence is still available in the original disk and can be used to create another image. This done using some specialized software which adds a write protection to the data to avoid data modification before the evidence is produced in the court of law.
Digital/computer forensic involves dealing with very important data that requires a lot of protection to maintain its integrity during an investigation. It is therefore the role of forensic team to ensure the data is not altered during collection, documentation and analysis. To accomplish this, digital team must use some data protection methods including physical protection and backup protection. In backup protection, the backup data must be well protected by all means to ensure it is not tampered with e.g. by using write protection mechanism.
Forensics Information from CERT Retrieved from
The Forensics Science Portal Retrieved from
Click following link to download this document
Phase 1 Individual Project.docx