Response to an incident involving a computer

Assignment Help Basic Computer Science
Reference no: EM13819798

As the security representative for Computers, Security, and Investigations Inc. (CSII) in Centervale, you are the first responder to an emergency telephone call reporting that someone inside the computer lab may have been accessing child pornography. The security policy requires that you, as the first responder, investigate and document incidents fully.

As the first responder, you notify your immediate supervisor and close the lab for the rest of the day. Your supervisor, the chief security officer (CSO), requests a 6- to 8-page comprehensive report that details the situation and your actions as the first responder. You also consider contacting the director of the information technology (IT) department and the local authorities.

You are a security professional and not a law enforcement officer. You realize, however, that your work as the first responder is important for corporate responsibilities and further legal considerations. You are aware that your documentation could greatly affect the corporate policies and the prosecution of the individual.

What considerations will your documentation present for the corporation? What considerations will your documentation present for law enforcement? Please itemize how this can affect both entities.

Situational Information:

Each person that enters the library must sign in and sign out of the computer lab in the library.

Each person's identification is not verified by anyone.

There are no cameras in the computer lab, but there are cameras at the main entries and exits of the building.

Several potential witnesses were within the lab when the computers worked, and then suddenly stopped working.

No one touched the computer since the individual left the laboratory.

Several of the witnesses can identify the individual but not by name-blue jeans, a white T-shirt, black sneakers, a short haircut, no facial hair, and Caucasian male.

A thumb drive was left in the computer by the suspect, but the librarian touched the thumb drive.

Here's What You Need to Do . . .

Assume you were assigned the task of conducting a thorough investigation. Analyzing evidence from the scenario and using research from your course readings, complete a 6- to 8-page comprehensive report of the situation:

Identify the type of computer crime that may have occurred. Make sure to include an explanation of all computer components that are involved.

Describe the procedures that you would take to preserve the computer evidence at the scene.

Describe and sketch the scene.

Describe whom would you speak to or interview.

List what investigative questions you would ask the witnesses, victims, and perpetrator.

Explain other procedures you may take in order to investigate this case.

Outline the approximate timeline of events.

Describe what the witnesses saw or heard.

Describe the entities that were contacted.

Explain everything you did as the first responder to the scene and outline the importance of your actions.

Analyze the legal considerations and liabilities of law enforcement agencies in this situation.

Make recommendations for countermeasures and future protection against a similar incident.

Reference no: EM13819798

Questions Cloud

Modeled with a linear inequality : Think of a situation that can be modeled with a linear inequality. This must be a situation where more than one possible solution is acceptable. Describe your situation and why more than one solution is possible. Write an inequality to model the situ..
Examine the broad environmental trends : Write a Start the report with a brief introduction of what you intend to discuss above.Following the introduction, examine the broad environmental trends within which the two companies operate. Also focus on the stage of the industry (embryonic, grow..
What is the characteristic polynomial of a : dim(ker(A-3I)^2)=4 dim(ker(A-3I)^3)=5 What is the characteristic polynomial of A? what is the minimal polynomial of A?
Linear programming case study : It will be a problem with at least three (3) constraints and at least two (2) decision variables. The problem will be bounded and feasible. It will also have a single optimum solution (in other words, it won't have alternate optimal solutions).
Response to an incident involving a computer : Response to an Incident Involving a Computer
Solve the system of equations : Solve the following system of equations 1,      x+2y=2          -4x+3y=25
Determine an appropriate certification for the industry : Determine an appropriate certification for the industry you are currently employed in. Briefly describe the certification requirements, identifying the benefits in obtaining the certification and possible hurdles for a company.
Describe the open systems interconnection : Describe the Open Systems Interconnection
Drive the total cost of procurement down : The concept of reverse auctions has become popular to drive the total cost of procurement down. Discuss how reverse auctions might be a good fit for some supplies and not for other supplies.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Define a job scheduling strategy that will meet business

Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pictorial form so that it is easy to understand.

  Develop a program to play lottery

Suppose you want to develop a program to play lottery. The program randomly generates a Lottery of a two-digit number, prompts the user to enter a two-digit number, and determines whether the user wins according to the following rule.

  Arrays for computer science

Initialize the array with the appropriate number of values.

  Develop a c program

Develop a C program. The program should implement and test the following function: uint countOnes(uint hexNumber); The function will return the number of one bits in hexNumber.

  What is primary security risk users acknowledge using macros

Write a 200- to 300-word response that answers the following question: Based on the article by Lenning (2005), what is a primary security risk that users should acknowledge when using macros?

  The authentication process in a synchronous token system

Describe how the Kerberos authentication process work and outline the main components within the Kerberos environment, their respective functions and the level of security provided by Kerberos. Draw a diagram supporting your explanation Explain..

  Explaining index number in time series analysis

What is an index number as relates to time series analysis? In a regression of a time series that states data as a function of calendar year, what requirement of regression is violated?

  Designing vb applications across multiple platforms

Designing VB Applications Across Multiple Platforms, This assignment will contain two (2) Parts: Written Paper and Visual Basic Prototype. The Visual Basic Prototype is not included in the total page count but is included in the evaluation of your..

  Example of extrinsic reward - example of intrinsic reward

Give an example of intrinsic reward and an example of extrinsic reward you have met with recently. Which of those had a bigger influence on you and why?

  Why supply-demand-equilibrium price different in short term

Price of product in short-term and long-term also describe why you believe supply, demand, or equilibrium price will be different, if at all, in short-term and long-term.

  Random string of 100,000 characters is written

A random string of 100,000 characters is written down, where each character is independently, equally likely to be any of the upper-case letters A through Z in English.

  Resilience systems without disturbing normal businesd

With an increasingly global economy when business is open 24 / 7, how do we test the resilience of our computer systems without disturbing normal business operations?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd