How you would use the tool in the investigation

Assignment Help Other Engineering
Reference no: EM131310487

Assignment

Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion.

Write an eight to ten page paper in which you:

1. Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab.

2. Analyze the physical and logical places where you would look for potential evidence on the suspect's computer(s) and / or network servers.

3. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing.

4. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect's computer(s).

5. Identify the tools you would use to perform your investigation from beginning to end based on the information you have on the incident. Provide a brief overview of each tool, to include:

• A description of the tool.
• How you would use the tool in the investigation.
• How the tool helps the investigation and the evidence you expect it to provide.
• Why you believe the evidence the tool provides is critical to the investigation.

6. Use at least five quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM131310487

Questions Cloud

Explain quality management planning : Explain quality management planning.Contrast quality assurance and quality control.Describe the different quality activities involved in this project and each of their outcomes.Describe Pareto diagrams and their use in project management.
Draw an arbitrary closed contour : Suppose a capacitor is inserted into the circuit instead of any of the resistors and the current is switched on. Draw a closed contour for which the total net current is not necessarily zero.
Explain laws that would be effective to convict offenders : Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations.
Describe the marketing background of the company : Aim: Conduct a marketing analysis of JB hi Fi. Describe the marketing background of the company - Key information about the industry, What type of a company
How you would use the tool in the investigation : How you would use the tool in the investigation. How the tool helps the investigation and the evidence you expect it to provide. Why you believe the evidence the tool provides is critical to the investigation.
What changes have recently occurred in kalewoods deposit mix : What changes have recently occurred in Kalewood's deposit mix? Do these changes suggest possible problems for management in trying to increase profitability and stabilize earnings?
Develop a wireless and remote connectivity assessment : Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal.
Calculate the current rating of the fuse : Design the width of the fusing section so that it will break at currents above I = 20 A This design is typical of automotive fuses (although pure copper is almost never used because of oxidation problems).
Discuss about the enterprise security plan : Discuss about the Enterprise Security Plan.Include the following:Physical and Logical security measures for your network,Selected encryption methods,Programs to educate users about wireless security.

Reviews

Write a Review

Other Engineering Questions & Answers

  Report and the multisim design for your project

Conceptual Design: Explain the block diagram and what each block does (its functionality) and how it works. Also, be sure to explain when one might use an operational-amplifier wheatstone bridge and its advantages.

  Process of exploration project to mining operation

Describe the process of exploration project to mining operation with reference to the ore resource/reserve estimation process.

  How the diode diverges from the resistor-like behavior

To obtain the behavior of the voltage and the corresponding current I plotted the graph of V vs. Ito display how the diode diverges from the resistor-like behavior.

  How does a call graph differ from a data flow graph

How does a call graph differ from a data flow graph? What simple electrical device is used to conduct high frequency noise to ground? Why is an interrupt routine slower than procedural code?

  Calculate the potential dividers resistor values

Calculate the value of RB necessary to operate the NPN transistor in saturation, stating all assumptions made.

  The grantham online library about teamwork

Directions: Please answer the question and support your ideas, then respond to a minimum of two of your classmates. In weeks 7 and 8, you will work with other student in the class on a team project. It is important to understand what makes a team s..

  Prepare a report on sensors in the multi pump system

Prepare a report on Sensors in the Multi Pump System - summary should state the purpose of the paper.

  A voltage-divider based common emitter

Verify the bipolar junction transistor (BJT) voltage divider biased DC parameters through schematic theoretical analysis, simulated circuit analysis and constructed circuit analysis

  Traffic management plan for a four-lane

Write a report to develop a worksite traffic management plan for a four-lane two-way arterial road. In you plan include: The eight steps of worksite traffic management processes. The location of lead vehicle, work vehicle, shadow vehicle and tall veh..

  Comparison of d-type versus j-k flip-flops

The most common use for the NAND latch is as a switch debouncer. What is switch bounce, and why do we need to eliminate it?

  How registers are stored on the stack

Write a 4-6 sentence summary describing the convention of saving $sn registers at the top of the subroutine and restoring them at the end. How registers are stored/restored on the stack and how the $sp is affected.

  Provide a graphical representation of the supply chain

Formulate the optimisation problem which will account all costs and revenues in the supply chain and optimise its operation, dominantly the logistic, such that bio-refineries get the maximum profit.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd