Question 1
The issue that the data that has been affected should be looked into is an important aspect. I agree with this notion that the data that has been affected should be investigated to find out the extent and the measures that should be taken in order to effect recovery measures. I also add the fact that there should be substantive assessment of the security breach that has been affected so that the measures that will be undertaken will be effectively seen. The personal identification information (PII) is crucial data that should be looked into when assessing the damage of personal breach of information. The use of digital investigators is an issue that is of great concern. I believe that cyber attacks are becoming advanced and targeting personal information. The use of digital investigators is an important step in order to check the data that has been affected in the attack. There are various digital forensic professionals that can be used to undertake thorough investigations (Casey, 2011).
Question 2
Computer forensics is indeed an important process that should be included in disaster recovery and business continuity. With the integration and the connectivity of information systems in the current business processes, there are many information systems which have been compromised. This has called for the integration of computer forensics while recovering affected data. This is an important field which has come up. Computer forensics is a field which is used and integrated to manage and recover affected and compromised data. When data and information systems are compromised, the use of computer forensics is vital (VMware, 2011). Business failure and disasters that are now currently experienced is connected and related to information systems. This is the reason why computer forensics should be used in disaster and business continuity. This has changed the process of business continuity and disaster recovery (Zhu, & Chiueh, 2003).
References
Casey, E. (2011). Investigating computer intrusions. In Digital evidence & Computer Crime: Forensic science, computers, and the Internet (3rd ed.). (pp. 369-419). London, England: Academic Press.
VMware, Inc. (2011). VM data recovery. Retrieved January 26. 2011, from http://www.vmware.com/products/data-recovery/
Zhu, N., & Chiueh. T.-C. (2003, June 22-25). Design, implementation, and evaluation of repairable file service. Paper presented at the meeting of The International Conference on Dependable Systems and Networks (DSN'03), San Francisco, CA. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.9505