Chief executive officer and disgruntled employee

Assignment Help Basic Computer Science
Reference no: EM132718392

Chief Executive Officer and Disgruntled Employee

Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO's) internet protocol (IP) address, and fully utilized CEO IP address to send belligerent email messages, making messages to appear as if the CEO is the author of offensive messages.

In the process, the organization information technology security (ITS) team was notified and started monitoring all incoming and outgoing network traffic in an attempt to catch the perpetrator or the CEO, in action.

Without a shred of doubt, the CEO was the person of interest. Tactlessly, word of the investigation leaked out within the organization and the perpetrator withdraw from repeating offensive messages.

Thank goodness, information gathered from a router early in the investigation showed that the CEO's IP address is provisionally associated with the Media Access Control (MAC) address of another computer workstation within the organization.

The discovered MAC address used to locate the antisocial computer workstation belongs to a one of the disgruntled active employees who is a member of software development department within the organization.

Persistent investigation reveals that the disgruntled employee's computer workstation is involved in this unlawful and criminal operation.

Question-1

Absolutely, there was no external malefactor; then, which component of the social engineering attack (SEA) is involved in Chief Executive Officer & Disgruntled Employee operation?

Monitoring all incoming and outgoing network traffic to catch the perpetrator was not a smooth sailing operation without active involvement of information technology security (ITS) team.

Question-2

Do you agree that the digital forensic investigator must seek assistance from the organization ITS team to fully exonerate the CEO?

Question-3

Do you the hopeful digital forensic investigators accept that that digital forensic investigators must go through bi-annual training on TCP/IP and the Open System Interconnection (OSI) reference model to battle uncertainty in the crime scene?

Reference no: EM132718392

Questions Cloud

What is the consolidated gain on the sale of equipment : Now assume that Shiek sells the equipment to an outside party for $900,000 on January 1, 2019. What is the consolidated gain on the sale of equipment
Journalize the transactions for pharoah inc : Journalize the transactions for Pharoah Inc. Purchased 3,100 shares of Escalante Corporation common stock (4%) for $188,480 cash.
Trade offs between security and privacy : What are the trade offs between security and privacy? What are the principles and limitations to an individual's right to privacy?
Philosophy of education in today society : Please write me an essay about your own Philosophy of Education in today's society, this will be the basis on my study if what philosophy is being used
Chief executive officer and disgruntled employee : Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO's) internet protocol (IP) address,
What do think of a concern for small business owners : Financial liability for the company but you can still claim full credit for withholding. What do think of a concern for small business owners and officers?
Teleological ethics immanuel kant : Which of the theories of the three philosophers we've studied best resonates with you? Which do you like best/connect with the best and why?
Analyze a current or historical mass murder case : Not all mentally ill individuals exhibit violent behavior and commit violent crimes, and not all criminals are mentally ill. The mental health of the offender.
Do you think that non-human animals have interests : Do you think that non-human animals have interests (CO4)? Does this mean that they also have rights? Explain.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Finds the largest number of times that a key is repeated

Sketch a data-parallel program that operates on a sorted list of keys and finds the largest number of times that a key is repeated.

  Component functions and communication flows

System architecture is the descriptive representation of the system's component functions and the communication flows between those components.

  Create an instance variable credit limit to indicate

Create another sub class CreditCustomer. Create an instance variable credit limit to indicate the maximum limit ($500). Credit customers get a markup of 2% on the order price.

  Write a paper that explains memory management requirements

Write a paper that explains memory management requirements. Write a paper that explains the differences in memory management between Windows® and Linux®.

  How about ethernet sata firewire usb media cards

How about Ethernet, SATA, FireWire, USB (2.0 or 3.0), media cards? Think of the data transfer/exchange requirements and what kind of speeds are necessary to make them work effectively.

  Calculate the number of days for the first workshop

In cell D5, enter a formula to calculate the number of days for the first workshop. Apply Number format with zero decimal places to the range D5:D9.

  Two complement representation

How many unique integer values can be represented in an 8-bit two's complement representation?

  Macro environmental analysis

You have to the research on company Nordstorm. first conduct an industry analysis (Porter, 1985) and a macro environmental analysis

  Literature for information on position of cko

Investigate literature for information on position of CKO and find out an approximate percentage of firms with knowledge management initiatives which have CKOs.

  State the principle of defense in depth give two

define the principle of defense in depth. give two examples of how the principle might be applied one describing

  The media access control (mac) address of a network

The media Access Control (MAC) address of a network interface ia a unique address. Each network interface relating to it's MAC fits the critera of a function because each device has it's own, unique MAC address. Describe an everyday situation in your..

  Accordance to the recommendations

Write a report in accordance to the recommendations of the links on the study desk. The word-count limit for the introduction, body and conclusion of this report is set at about 3000 words

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd