Chief executive officer and disgruntled employee

Assignment Help Basic Computer Science
Reference no: EM132719778

Chief Executive Officer and Disgruntled Employee

Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO's) internet protocol (IP) address, and fully utilized CEO IP address to send belligerent email messages, making messages to appear as if the CEO is the author of offensive messages.

In the process, the organization information technology security (ITS) team was notified and started monitoring all incoming and outgoing network traffic in an attempt to catch the perpetrator or the CEO, in action.

Without a shred of doubt, the CEO was the person of interest. Tactlessly, word of the investigation leaked out within the organization and the perpetrator withdraw from repeating offensive messages.

Thank goodness, information gathered from a router early in the investigation showed that the CEO's IP address is provisionally associated with the Media Access Control (MAC) address of another computer workstation within the organization.

The discovered MAC address used to locate the antisocial computer workstation belongs to a one of the disgruntled active employees who is a member of software development department within the organization.

Persistent investigation reveals that the disgruntled employee's computer workstation is involved in this unlawful and criminal operation.

Question-1

Absolutely, there was no external malefactor; then, which component of the social engineering attack (SEA) is involved in Chief Executive Officer and Disgruntled Employee operation?

Monitoring all incoming and outgoing network traffic to catch the perpetrator was not a smooth sailing operation without active involvement of information technology security (ITS) team.

Question-2

Do you agree that the digital forensic investigator must seek assistance from the organization ITS team to fully exonerate the CEO?

Question-3

Do you the hopeful digital forensic investigators accept that that digital forensic investigators must go through bi-annual training on TCP/IP and the Open System Interconnection (OSI) reference model to battle uncertainty in the crime scene?

If Yes, provide a comprehensive narrative to support your assertion.

Reference no: EM132719778

Questions Cloud

What is the rate of markdown at the sale price : What is the rate of markdown at the sale price? A furniture supplier lists a dining room set for $1,800 and offers trade discounts of 25%
How applying for the pro bono work done without jeopardizing : Titian is a management accountant specialised. Explain how applying for the pro bono work could be done without jeopardizing these two ethical standards.
Critically reflect on the core stages of mental health : Analyse evidence-informed, practice-based contemporary issues of mental health for diverse individuals and diverse backgrounds
How the company use of a post audit would help to prevent : The proposal would otherwise have been rejected. Explain how the company's use of a post audit would help to prevent this type of unethical behavior.
Chief executive officer and disgruntled employee : Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO's) internet protocol (IP) address,
Explain the production process with buffer stocks : a) Define buffer stock. Explain the production process with buffer stocks.
Operational excellence in any field of human endeavor : Discuss at least two trends or best practices related to key concepts and principles of operational excellence in any field of human endeavor
Commodity calls for demand of another commodity : State factors that may affect the geographical mobility of labour.
How to calculate the company accounts receivable turnover : How to Calculate the company's accounts receivable turnover ratio and the average collection period for accounts receivable in days.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Sketch the pattern of voltage standing waves on the line

Sketch the waveforms for the incident, reflected, and resultant voltages at the instant the generator is at its maximum positive voltage.

  Information governance reference model

Order to interpret the Information Governance Reference Model (IGRM) diagram. It is recommended that we start from the outside of the diagram.

  Difference between projects and ongoing operations

What is the difference between Projects and ongoing operations?

  Identify the input and output parameters

Identify the sensor, signal conditioner, and display elements of a measurement system such as a mercuryin-glass thermometer. Identify the input and output parameters

  How the records are changed

How would your answers to Exercise 10.7 change if attribute a is not a candidate key for R? How would they change if we assume that records in R are sorted on a?

  Discuss the fundamental advantages and disadvantages

Companies that currently use expert systems. Next, discuss the fundamental advantages and disadvantages of using expert systems instead of human expertise within the companies that you have selected. Provide a rationale to support your response..

  Monitors and printers are output devices

The computer is the 'box' or systems unit. Identify and describe at least three components that are found inside the systems unit.

  Result of the calculation to be truncated

Assuming that variables value1 and value2 are both declared as ints, which of the following statements causes the result of the calculation to be truncated?

  Heart rate as that person

what happens to a person's heart rate as that person increase his or her activity level?

  Design algorithm much more easily

As you will see when you complete the modular program design you will be able to add the new requirements to the design algorithm much more easily.

  Laws are regarding cyber stalking

Using the Web or other resources, find out what your state's (massachusetts ) laws are regarding cyber stalking.

  Present a convincing argument

For this assignment, you will play the role of an employee who's been asked to present a convincing argument on why the company should move from a conventional client based productivity suite, MS Office 2010, to a cloud based productivity suite. F..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd