Conduct internal investigations

Assignment Help Basic Computer Science
Reference no: EM132409312

Computer Forensics - Initial Report Assignment

Brainstorm with your teammate for a simulated computer forensics task

Scenario - Our organization has an intranet that takes care of our emails and internet sites employees surf in the workplace, which is strictly for work related activities, things have been going so well for years, then suddenly, we started having malware attacks in our organization. We came to the realization that one or some of our workers that are peers have been using the intranet and company's email for personal related businesses, no illintent of course from their perspective but their carelessness and unprofessionalism has led to our intranet being infiltrated by powerful hacker group that has been targeting us for a while, as we are a huge financial company that manages a lot of liquid cash, assets and stocks for clients and organizations. Now we are at risk of losing our clients, our great reputation/status and assets in the process. Now we are prompted to halt this damage and possibly reverse it, we have to find the exploited areas to halt these malware attack, possibly find and trace these attackers, involving the law and then educate employees more on cybersecurity and how to handle cyber related activities.

Make a step by step investigation plan, including expected challenges and approaches to solve the challenges.

Conduct internal investigations to know who exactly the culprits of these exploited vulnerabilities are.

Knowing the systems and networks that opened us up to the attacks.

Gathering information about these malwares and confirming their origin.

Calling a forensic expert to do professional forensic analyses.

Tracking the attackers.

Involving law enforcement.

Educating thoroughly our employees on cybersecurity related activities.

The challenges will be the time to carry out the investigation, it will take a lot of time, then money to complete the overall project. It will be costly but surely effective to solve the challenges. Also, education of employees on cybersecurity will take a lot of financial resources and man power.

Summary of the Work - In summary, we are trying to halt malware attacks on our organization, find out how it got to us, which system and networks were compromised. We are also trying to confirm the source of the attacks, the motivation behind the attacks and move forward with the law enforcement with the help of a professional forensic expert, so as to protect our assets, clients and protect our great reputation. At the end, we properly educate all employees on cybersecurity and also harden more our systems and networks.

Attachment:- Assignment File.rar

Reference no: EM132409312

Questions Cloud

Which alfons heck participation in the hitler youth : Describe and analyze the ways in which Alfons Heck's participation in the Hitler Youth and in the culture of Nazism served to craft his sense of purpose
Management to governance in international economic relations : The transition from management to governance in international economic relations has been said to have gone through three phases, according to Spero and Hart:
What is the main point of your paper : A research essay necessitates you to locate information about a topic. What is the main point of your paper. What would you like me to address in your paper
Directions in process of strategy development-execution : How do individual and group decision processes aid or impede business decision making? What are newest directions in process of strategy development-execution?
Conduct internal investigations : Computer Forensics - Initial Report Assignment - Conduct internal investigations to know who exactly the culprits of these exploited vulnerabilities are
Think about person from different culture : Think about a person from a different culture with whom you work or have worked or interacted professionally
Explain what you can contribute as a : Explain what you can contribute as a leader to assure your project team that this is the right thing to do. What will you do to motivate them?
Proposals requesting funding : Discuss what types of information you would need to include with proposals requesting funding.
Possible tort claims that patty can make against cash mart : What are the possible tort claims that Patty can make against Cash Mart? Discuss elements of claim and how those elements relate to the facts in the scenario

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd