Forensics investigation trainee at two way communications

Assignment Help Basic Computer Science
Reference no: EM131369581

In this course, you have assumed the role of a forensics investigation trainee at Two Way Communications. You have received positive feedback from the CEO regarding your last report, and you are asked to train with the Internal Security department. Your first task with Internal Security is to investigate allegations involving one of the company's sales account managers.

Read the following project information, if needed.

With the Internal Security department, you are investigating the activities of a sales account manager at Two Way Communications, Inc. He is allegedly using personal social media accounts and unapproved email techniques to market company products to potential customers. The company has received a number of complaints about receiving unsolicited emails from the sales account manager. Company policy clearly states that sales account managers may use approved channels to reach potential customers, and that they are not allowed to use personal social media accounts. The CEO asks you to write a one-page report describing the following.

  • The evidence suggests that the employee is collecting email addresses using his personal contacts' social media accounts. He is creating lists of these email addresses and sending out mass emails asking for recipients to provide him with their phone numbers, so he can reach them via phone to try to make a sale. He has been including the company's logo at the top of the messages. Write a paragraph that explains which type of email fraud this is.
  • Midway through your investigation, a family member of the sales manager received one of the unsolicited emails and found it suspicious, so she printed it and shared it with the sales manager himself. The sales manager then asked Internal Security to investigate the incident. Consider whether this development indicates that the sales manager may not be involved in the fraudulent activity. Write a paragraph describing the steps you would take to collect evidence and figure out whether or not the employee is behind the emails.
  • Your supervisor collects the employee's mobile phone to be searched for evidence. The mobile phone has a SIM card. List the steps you would take to access the data on the SIM card and any tools that can be used to read the card

Be sure to fully answer all questions and prompts, and provide justification for your answers when necessary.

Submit the assignment as a Microsoft Word document using the template provided to the Unit 4 Part 3 Dropbox in  APA format.

Reference no: EM131369581

Questions Cloud

Represent important understandings of identity and worldview : Flags have significant symbolic meaning in a culture and represent important understandings of identity and worldview. Explain how flags represent cultural patterns and characteristics. Explain their influence on your personal connection to a cult..
What is the utilization rate of the booth workers : How many booth workers are required for the average potential customer to spend no more than 5 minutes waiting and being served? How many potential customers are waiting to be served, on average? What is the utilization rate of the booth workers?
Multi-service aviation business and including fuel : Earhart Aviation operates a multi-service aviation business, including fuel, aircraft maintenance, charter flights, aircraft rentals, and flight instruction. Not only should the user interface be thoroughly tested, there must be sufficient user docum..
Evaluate equation of a trend line to forecast sales : Using the regression feature of Excel, compute equation of a trend line to forecast sales in 2014 and 2015. Note, you can use 'Year' as the explanatory variable or the 'Time Index' as the explanatory variable, but not both in the same equation.
Forensics investigation trainee at two way communications : In this course, you have assumed the role of a forensics investigation trainee at Two Way Communications. You have received positive feedback from the CEO regarding your last report, and you are asked to train with the Internal Security department..
What is the probability that its top executive made : If a firm is randomly chosen from the list of 10 firms studied, what is the probability that its top executive made over $1 million per year?
Independent of the actual number of passengers on the plane : Northwest Airlines runs daily flights from Detroit to Amsterdam. They face a fixed cost of $70,000 for each flight independent of the actual number of passengers on the plane. There are 310 seats available on a plane. One way tickets generate revenue..
Pricing structure of the provider : 1. Do they offer PaaS, SaaS, or both? 2. How is the pricing structure of the provider designed? example price per gb storage price per vm, price per gb data transfer? 2. How easy does it appear to be to set up an account and start using their serv..
Why evaluation is critical to training success : Reflect on and explore the reasons why evaluation is critical to training success. Discuss the reasons evaluation is critical to effectiveness of training. Explain the connection between organizational improvement and training effectiveness.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd