Investigation of identity theft or fraud

Assignment Help Operating System
Reference no: EM13819294

Jane pays a few personal bills from her computer at home and at work. The next day, she receives an e-mail at work, requesting her to confirm her Social Security number so that one of her payments can be executed. Jane provides the information against her better judgment.

Within one week, Jane notices a dramatic increase in her credit card balance. She also starts receiving strange telephone calls from vendors about bills she did not create. Worse, a Secret Service special agent visits Jane at work and questions her about making threatening calls to a political figure.

Jane is convinced that her identity has been compromised and informs the Secret Service special agent everything that occurred within the past week. Jane is not sure whether her home or work computer was compromised but shows the special agent the e-mail she received one week before about her Social Security number.

Here's What You Need to Do . . .

You are assigned to investigate Jane's computer security issues, and you realize that Jane is a legitimate victim of identity theft or fraud. Your job is to help Jane understand identity theft or fraud and to create a 4- to 5-page report that outlines the process for moving this case forward.


In one page, analyze Jane's case of theft or fraud. Make sure to use specific details from the scenario and research from the course readings to support your ideas.

In your report, include the following:

Explain the historical and current legal considerations of identity theft or fraud and the way Jane's case is classifiable as such.

Explain how such cybercrimes impact society.

Evaluate the value of computer security and personal responsibility in such cases-in other words, discuss the things Jane could do to stay safe in the future.

Explain how you would proceed to investigate this case. Make sure to use specific details from the scenario and research from the course readings to support your ideas. In your report, include the following:

Identify individuals with whom you would need to speak-for example, supervisors at Jane's place of employment, supervisors at your office, and the US prosecutor.

Analyze the situation to describe the different venues involved, the electronic evidence required, and the proper consent and search warrants needed (if applicable).

Identify the information you need to obtain for this case.

Explain how you would record the evidence of this investigation from beginning to end.

Reference no: EM13819294

Questions Cloud

What is clean powers corporate social responsibility : What are the above stakeholders' interests for each ethical issue or concern you identified? What are the stakeholders’ responsibilities for each ethical issue or concern you identified? What are the possible decisions the corporation could make for ..
Specific visual work to analyze for your media analysis : Choose a specific visual work to analyze for your Media Analysis Project (MAP). Your project can be on any media; print, photography, television, film, the Internet, etc. You will explore this topic in detail by using the six perspectives
Compare at least three different software development method : Compare and contrast at least three different software development methods. Explain why the testing of software products is of great importance.
Managerial tasks in strategy execution : While companies must tailor their strategy-executing approaches to their particular situation, there are eight managerial tasks which are common elements in executing strategies
Investigation of identity theft or fraud : Investigation of Identity Theft or Fraud
Examine two issues of standardization in general for mnes : Examine two issues of standardization and localization in general for MNEs. Determine two ways in which an organization would benefit from standardization of IHRM activities.
Concepts of effective persuasion : In this assignment, you will write a research paper (5-6 pages) which will examine communication techniques, the use of power, and how the concepts of effective persuasion are applied to a specific situation
Examine two stages that an organization goes through : Examine two stages that an organization goes through as it grows internationally. Explain key reasons why a large MNE with a long international history and extensive cross-border operations might choose to standardize its IHRM practices.
Core market offerings and defining the product : From the case study, take a position on whether Tropicana did or did not make a major mistake in changing its product packaging. Next, suggest the next two (2) steps that you believe Tropicana should take in its branding strategy in order to count..

Reviews

Write a Review

Operating System Questions & Answers

  A machine has a 32-bit address space and an 4-kb page

A machine has a 32-bit address space and an 4-KB page. Suppose a simple OS just boot up on the machine, running a single process. The process uses 2 memory pages for the text and data memory (combined) near the lowest virtual address, and 1 memory pa..

  Managing contention for shared resources

Case Study - Managing Contention for Shared Resources On Multicore-Processors, Examine the authors' findings. (The authors ran three (3) applications (Soplex, Sphinx, and Namd) to test memory contention problems when different pairings of these app..

  Project that uses interactions to develop the system

on a project that uses interactions to develop the system, in which interation does systems design begin? explain why

  Describe the processes involved in the management

Identify and describe the processes involved in the management of the services, disk quotas and security of both Windows and UNIX operating systems.

  Scientific principles behind a computer technology

Explain the scientific principles behind a computer technology and discuss how social, political, economic or ethical impact of computers on our cultural structures and beliefs.

  C language code that reads a lowercase

Required some guidance writing a program in C code that reads a lowercase string of characters from a text document named "data.txt",

  Operating system proposal

Operating System Proposal

  File systems on linux vs. ntfs file systems

List what characters are absolutely not allowed for ext4 file systems on Linux vs. NTFS file systems on Windows in a plain text document.

  Developing a web portal for modeling agency

The designer starts with a high level description of functions that are to be implemented and builds lower level explanations of how each module will be organized and related to other modules.

  Simulation of elevator and shortest seek time first sstf

simulation of elevator and shortest seek time first sstf disk scheduling algorithmrequirements must be implemented in c

  Command to rename all files in your entire system

Write a command to rename all files in your entire system named temp.old to New - Count the number of lines in file F1 that has the word unix

  How many processes a computer can efficiently support

Show the factors that you think would limit how many processes a computer can efficiently support?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd