Describe whom would you speak to or interview

Assignment Help Computer Network Security
Reference no: EM131155807

The security representative for Computers, Security, and Investigations Inc. (CSII) in Centervale, you are the first responder to an emergency telephone call reporting that someone inside the computer lab may have been accessing child pornography. The security policy requires that you, as the first responder, investigate and document incidents fully.

As the first responder, you notify your immediate supervisor and close the lab for the rest of the day. Your supervisor, the chief security officer (CSO), requests a 6- to 8-page comprehensive report that details the situation and your actions as the first responder. You also consider contacting the director of the information technology (IT) department and the local authorities.

You are a security professional and not a law enforcement officer. You realize, however, that your work as the first responder is important for corporate responsibilities and further legal considerations. You are aware that your documentation could greatly affect the corporate policies and the prosecution of the individual.

What considerations will your documentation present for the corporation? What considerations will your documentation present for law enforcement? Please itemize how this can affect both entities.

• Each person that enters the library must sign in and sign out of the computer lab in the library.
• Each person's identification is not verified by anyone.
• There are no cameras in the computer lab, but there are cameras at the main entries and exits of the building.
• Several potential witnesses were within the lab when the computers worked, and then suddenly stopped working.
• No one touched the computer since the individual left the laboratory.
• Several of the witnesses can identify the individual but not by name-blue jeans, a white T-shirt, black sneakers, a short haircut, no facial hair, and Caucasian male.
• A thumb drive was left in the computer by the suspect, but the librarian touched the thumb drive.

Here's What You Need to Do . . .

Assume you were assigned the task of conducting a thorough investigation. Analyzing evidence from the scenario and using research from your course readings, complete a 6- to 8-page comprehensive report of the situation:

• Identify the type of computer crime that may have occurred. Make sure to include an explanation of all computer components that are involved.

• Describe the procedures that you would take to preserve the computer evidence at the scene.

• Describe and sketch the scene.

• Describe whom would you speak to or interview.

• List what investigative questions you would ask the witnesses, victims, and perpetrator.

• Explain other procedures you may take in order to investigate this case.

• Outline the approximate timeline of events.

• Describe what the witnesses saw or heard.

• Describe the entities that were contacted.

• Explain everything you did as the first responder to the scene and outline the importance of your actions.

• Analyze the legal considerations and liabilities of law enforcement agencies in this situation.

• Make recommendations for countermeasures and future protection against a similar incident.

Reference no: EM131155807

Questions Cloud

Who has the burden of proving payment of money claims : Who has the burden of proving payment of money claims
Type of mental and physical work environment : Describe the type of mental and physical work environment in which you would like to work and why that type of environment is optimal to you?
Factory manager in a small rural county : You are a factory manager in a small rural county in Georgia. You place a want ad for factory workers whose job it will be to unload boxes from trucks. in the ad, you indicate that a high school diploma is required. In that particular county. the ..
Describe what hacking of memory or hacking of ram means : Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.
Describe whom would you speak to or interview : Describe whom would you speak to or interview. List what investigative questions you would ask the witnesses, victims, and perpetrator. Explain other procedures you may take in order to investigate this case.
Design a kinematic device that you can later manufacture : Your design must have a central rotating part that causes periodic motion elsewhere in the device - Design a kinematic device that you can later manufacture
Application-information technology in public health : Public health surveillance and prevention efforts in the U.S. reflect the involvement of numerous health care providers and organizations. Government agencies such as the CDC often function as a hub for the collection, coordination, and communicat..
Calculate and plot the excess enthalpy at 20 °c, 1 bar : Calculate the temperature change when 10 mol of benzene is mixed with 40 mol of heptane adiabatically, 1 bar., if the initial temperature of the pure components is 20 °C. The heat capacity of the pure liquids are CP 1 = 134 J/mol, CP 2 = 222 J..
Describe how and why information systems are used today : Explain the main factors that you should consider before deciding whether to buy a laptop or a tablet. Identify the key features of a laptop and a tablet. Next, discuss three (3) important characteristics of each that might influence your decision.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Genome4u is a scientific research project at a large

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases wit..

  Explain the difference between the client and the server

What is the difference between the client and the server. What is the difference between server-side and client-side scritping? Why are they separate

  Discuss limitations, omissions,or technical flaws

An abstract where you state what you have done, what is the contribution of the paper to the literature and what is the significance of that contribution (200-300 words).

  Elements of an effective it security policy framework

Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate and attack similar to the SCADA / Stuxnet Worm

  Discussion on computer crime

The state crime lab training coordinator is concerned with level of expertise at its Blacksburg, VA location and would like to contract DC Investigative to conduct four training sessions.

  Controversial topic in recent media stories

The escalation in computer crime is becoming an increasingly controversial topic in recent media stories. However, the way in which cybercrime is handled differs depending upon the country that has jurisdiction.

  Describe secure electronic transactions

Secure Electronic Transactions, Confidentiality and Integrity, Change Cipher Spec protocol, Web Security Approaches: application level.

  Implement the affine cipher in c programing language

Implement the Affine Cipher in C programing language with comments - Implement DES in C programming language with comments.

  How does anti-virus software detect malware

What is a malware? List four harm that malware can cause to an information system. How does Anti-virus software detect malware. What is the difference between Polymorphic and Metamorphic malware. Explain in details the difference between worm and vir..

  What hacking of memory or hacking of ram means

what hacking of memory or hacking of RAM means

  Explain your method of attack and operation of the law

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

  Nowadays the internet has been very broadly used as a means

nowadays the internet has been very widely used as a means of receiving and processing lots of information which are

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd