How would you acquire the identifying information

Assignment Help Management Information Sys
Reference no: EM131405228

You work as a security administrator of a large department store chain or choose another large corporation of your choosing. You believe that there has been a breach in the VPN where an employee has stolen data using a personal laptop along with using the company assignment computer.

You review the logs from the IDS, remote access systems, and, file servers and confirm this belief. Your employer wishes to gain access to the personal laptop used for the breach to determine the full extent of the data stolen. The guilty employee's lawyer claims that the laptop is not identifiable.

Create a formal document to the CEO of the company to account for your findings, tools used to solve the breach and what steps will be taken to prevent this type of breach from happening again. You will also need to create a press release to the Public regarding this breach. Create a disaster recovery plan for the employees and vendors in case of a breach.

Things to consider: What would best be used to identify the specific laptop used for the theft? How would you acquire the identifying information? List some items that would NOT be useful to identify the specific computer used by the insider.

Reference no: EM131405228

Questions Cloud

Provide techniques for managing risks at your company : Provide techniques for managing risks at your company. Explain the characteristics of insurance and what types would be needed for your company and why you chose those insurance types.
Comment on the possibility in given situation : Based on your results, comment on the possibility that the average lead concentration in this community's homes might exceed the Environmental Protection Agency's recommended limit of 15 parts per billion of lead.
Broad federal legislation prohibiting age discrimination : How might the lack of broad federal legislation prohibiting age discrimination against younger workers contribute to their experiences of discrimination and harassment at work?
Calculate book value of an asset : Genetic Insights Co. purchases an asset for $17,461. This asset qualifies as a seven-year recovery asset under MACRS. Calculate book value of an asset.
How would you acquire the identifying information : You work as a security administrator of a large department store chain or choose another large corporation of your choosing. You believe that there has been a breach in the VPN where an employee has stolen data using a personal laptop along with u..
Link between chechen separatists and al qaeda : Students assess the threat posed by Al Qaeda and associated Muslim extremists groups to American citizens and interests in the United States and abroad. Specifically you will evaluate the likelihood that the aforementioned groups will successfully..
Construct and interpret the given confidence intervals : Given the following observations in a simple random sample from a population that is approximately normally distributed, construct and interpret the 95% and 99% confidence intervals for the mean:
Select an information technology or services company : you will select an Information Technology or Services company. Alternately, you may select any other type of company, however, your strategic plan should be limited to the Information Technology or Services department within the company. You may f..
Example of a possible concealment : You are applying for auto insurance with a new company and a new agent. Give an example of a possible concealment, or being silent when you are obligated to speak. Be specific on the question and the answer. Then, give an example of a possible mis..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss about the case given below

LDR 506:Defining the Work System. Begin the paper by defining the work system as it is, following Figure 4.3. Construct a similar figure and identify each component (as relevant) in the appropriate box. Also include a 1-page summary of the system ..

  How organizations embrace innovation such as technologies

Examples of how organizations embrace innovation such as technologies and processes are more likely to survive than those that do not. This solution is a personal example that determined technology was a way to move forward to success.

  B2b product introduction

Sales Management hardware and software available for B2B product introduction and determine and compare these sales management hardware and software. Create a comparative table to judge the merits of the different options available.

  How the technology creates or contributes to the problem

Choose one ethical issue arising from the use of ICT that has been reported in the press in the last one year, and discuss it in depth. Show why or how the technology creates or contributes to the problem

  The four stages of the bpm process

The four stages of the BPM process are model process, create components, implement process and assess results. Explain each one and summarize the activities in each

  What are most common today computing environment and why

Identify the top 3 most current operating systems in use today. What are the most common and most relevant to today's computing environment and why? Be sure to cite at least two sources along with stating your opinion.

  Create a graphical representation

Create a graphical representation of your recommended architecture. Identify and describe any potential ethical issues that could arise in connection with the new architecture

  Explain what are advantages and disadvantage of social media

What are advantages and disadvantages of social media? How might knowing these advantages and disadvantages alter how a person might use social media? What credibility issues can arise from information on the Internet?

  What does interfaces mean under scope section

Currently working on a business requirements document.  What does "interfaces" mean under "Scope" section?

  Why is an erp system important to your organisation

Discuss how information technology plays a role in the competitive environment of your organisation. How do you describe the competition to attract and retain clients/customers for your organisation? How do you describe the threat of substitute in..

  Explain hierarchy processes and project control systems

Project Management: Alternatives, Hierarchy Processes and Project Control Systems and Technologies - example of each type of technology and explain why you feel it fits into the category.

  Which parameter is not part of defining network performance

Which parameter is not part of defining network performance? Which parameter is not part of defining network response time

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd