Analyze the physical and logical places where you would look

Assignment Help Computer Engineering
Reference no: EM132142122

Question :

Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft.

You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion.

Write an eight to ten (8-10) page paper in which you:

Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab.

Analyze the physical and logical places where you would look for potential evidence on the suspect's computer(s) and / or network servers.

Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing.

Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect's computer(s).

Identify the tools you would use to perform your investigation from beginning to end based on the information you have on the incident. Provide a brief overview of each tool, to include:

A description of the tool.

How you would use the tool in the investigation.

How the tool helps the investigation and the evidence you expect it to provide.

Why you believe the evidence the tool provides is critical to the investigation.

Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

Check with your professor for any additional instructions.

Reference no: EM132142122

Questions Cloud

Discuss common stock valuation : Question - Discuss common stock valuation and the required assumption(s) for zero growth. Relate this discussion to a real-world problem
Describe one or more algorithms at a high level : Suppose you need to manually sort a hand of cards. What techniques, other than a bubble sort, would you implement?
Advertising department and research department : Preliminary discussions between the advertising department and the research department of the advertising agency resulted
Show the effect of the central bank action : Using the graph of the money market, show the effect of the central bank's action on the nominal Interest rate in the eurozone.
Analyze the physical and logical places where you would look : Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing.
What is the future value of the same annuity due : If the future value of an ordinary, 5-year annuity is $6,000 and interest rates are 8 percent, what's the future value of the same annuity due
Derive a table that shows all possible combinations of mulch : Suppose a lawn care company can install either mulch or pine straw for flowerbeds of their residential customers.
Evaluate the causes of sudden stop and currency crises : Evaluate the causes of Sudden Stop and Currency Crises as outlined in the lecture and by Claessens and Kose alongside the Walter/Steinberg reading on external.
What annual rate of return have we earned : We bought a stock for $45.85 four years ago and we can sell it for $59.13 today. The stock does not pay dividends. What annual rate of return have we earned

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd