Corporate embezzlement

Assignment Help Basic Computer Science
Reference no: EM13761115

Corporate Embezzlement

Imagine you are employed by a large city police department as the leader of the digital forensics division. A large corporation in the city has contacted the police for assistance in investigating its concerns that the company Chief Financial Officer (CFO) has been using company money to fund personal travel, gifts, and other expenses. As per the company security director, potential evidence collected thus far includes emails, bank statements, cancelled checks, a laptop, and a mobile device.

Write an eight to ten (8-10) page plan report in which you:
1. Explain the processes you would use to seize, search, collect, store, and transport devices and other potential sources of evidence.
2. Indicate the personnel resources needed for the investigation and assess why you believe this amount of resources is warranted.
3. List the initial questions you would have for the security director regarding the company's email environment and explain the tasks you would consider performing for this portion of the investigation.
4. Create an outline of the steps you would take to ensure that if a trial were brought against the CFO, the evidence collected would be admissible in the court of law.
5. Determine the potential evidence (including logs, devices, etc.) you would request from the company security director based on what she has identified and identify the other data sources you might consider reviewing.
6. Explicate the tools you would use for this investigation based on the potential evidence the company security director has already identified, as well as any other potential sources of evidence you might review.
7. Describe the procedure and tool(s) you would consider utilizing for acquiring potential evidence from the CFO's mobile device.
8. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Describe and analyze practices in obtaining digital evidence.
• Compare and contrast the various types of computer forensic tools.
• Demonstrate the ability to develop procedural techniques in crime and incident scenes.
• Describe processes in recovering graphic, mobile, and email files.
• Develop a computer forensics plan that addresses and solves a proposed business problem.
• Use technology and information resources to research advanced issues in computer forensics.
• Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

 

Reference no: EM13761115

Questions Cloud

Security system to reduce its insurance premiums : The Bayside Art Gallery is considering installing a video camera security system to reduce its insurance premiums. A diagram of the eight display rooms that Bayside uses for exhibitions is shown in figure below; the openings between the rooms are num..
Brand-new model for automobile rental services : Zipcar is a highly successful new company specializing in a brand-new model for automobile rental services, allowing their customers long-term and flexible access to shared vehicles on a daily or hourly basis.
Description of corporate strategy : Does the company make many products or only a few? Is the industry or market growing, if so how does the company take advantage of that OR if the market is shrinking, how is the company protecting itself ? What is the company doing to deal with it's ..
Research database : Critique the article in terms of how the information within the article supports or disproves material.
Corporate embezzlement : Imagine you are employed by a large city police department as the leader of the digital forensics division. A large corporation in the city has contacted the police for assistance in investigating its concerns that the company Chief Financial Offi..
About to begin production of a new product : A company is about to begin production of a new product. The manager of the department that will produce one of the components for the product wants to know how often the machine will be available for other work. The machine will produce the item at ..
Controllers monitored and controlled variables : Determine five (5) of the controller's monitored and controlled variables. Describe each variable and explain how it is used in the system
Cengage advantage business law : Newmark & Co. Real Estate, Inc, contacted 2615 East 17 Street Realty, LLC, to lease certain real property on behalf of a client. Newmark e-mailed the landlord a separate agreement for the payment of Newmark's commission.
Write paper that presents your revised budget : Write a 4- to 6-page paper (using the instructor provided template below and attached)that presents your revised budget. Explain your rationale for any changes you made to the budgeted amounts

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Alternative donation scenario

Another alternative donation scenario is to deposit $25,000 now in a savings account with a guaranteed rate of return of 5% per year compounded monthly.

  Evaluate for risk management purposes

Choose three information assets that a typical organization has and evaluate for risk management purposes which vulnerability should be evaluated for additional controls first?

  Change of the image to that of a different image

The documents must display an image and three buttons. The buttons should be labeled simply 1, 2, and 3. When pressed, each button should change of the image to that of a different image.

  Demonstrate ability to integrate and apply information

demonstrate ability to integrate and apply information from various topics and to apply understanding and knowledge to a practical situation.

  Write a paper on service level agreements

Feel free to get ideas for a topic from the discussions from last week's discussions. Pick a topic, do the research, use references, be careful about plagiarism, and have fun. Select a specific topic within SLAs, not a general definition.

  Explain how you would apply the six sigma approach

When a senior product inspector at Plush Packet Inc. (PPI) inspected a shipment of Router the Raccoon plush toys she discovered that, on average, 15 of the 50 toys in every box had defective seams, and in many of the defective toys, the seams w..

  Security and ethical concerns in web-based tool

How could you use a wiki to collaborate with fellow students to improve this course? What security and ethical concerns would you have to consider if you implemented this classroom wiki?

  Why globalization is good or not good for a business

Write an argumentative paper of no more than 750 words that demonstrates why globalization is good or not good for a business. The paper should define the term good, and should identify the premises and conclusions.

  Read in information systems

Discuss communication in Unix vs other communication tools we use outside of the operating system (example:text, IM). Discuss anything you have read in Information Systems this past week or tell me what is on your mind about Information Systems.

  What will be the date in the opening of the letter

If /home/zach/draft and /home/max/letter are links to the same file and the following sequence of events occurs, what will be the date in the opening of the letter?

  Differences between sequential access and random access

Define and explain the differences between SEQUENTIAL ACCESS and RANDOM ACCESS

  List uses that this type of computer could support

List uses that this type of computer could support for whichever division selected from above.Explain why you think the impact will or will not occur, cite sources when necessary, and justify your position using APA format.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd