Investigation of identity theft or fraud

Assignment Help Operating System
Reference no: EM13819294

Jane pays a few personal bills from her computer at home and at work. The next day, she receives an e-mail at work, requesting her to confirm her Social Security number so that one of her payments can be executed. Jane provides the information against her better judgment.

Within one week, Jane notices a dramatic increase in her credit card balance. She also starts receiving strange telephone calls from vendors about bills she did not create. Worse, a Secret Service special agent visits Jane at work and questions her about making threatening calls to a political figure.

Jane is convinced that her identity has been compromised and informs the Secret Service special agent everything that occurred within the past week. Jane is not sure whether her home or work computer was compromised but shows the special agent the e-mail she received one week before about her Social Security number.

Here's What You Need to Do . . .

You are assigned to investigate Jane's computer security issues, and you realize that Jane is a legitimate victim of identity theft or fraud. Your job is to help Jane understand identity theft or fraud and to create a 4- to 5-page report that outlines the process for moving this case forward.


In one page, analyze Jane's case of theft or fraud. Make sure to use specific details from the scenario and research from the course readings to support your ideas.

In your report, include the following:

Explain the historical and current legal considerations of identity theft or fraud and the way Jane's case is classifiable as such.

Explain how such cybercrimes impact society.

Evaluate the value of computer security and personal responsibility in such cases-in other words, discuss the things Jane could do to stay safe in the future.

Explain how you would proceed to investigate this case. Make sure to use specific details from the scenario and research from the course readings to support your ideas. In your report, include the following:

Identify individuals with whom you would need to speak-for example, supervisors at Jane's place of employment, supervisors at your office, and the US prosecutor.

Analyze the situation to describe the different venues involved, the electronic evidence required, and the proper consent and search warrants needed (if applicable).

Identify the information you need to obtain for this case.

Explain how you would record the evidence of this investigation from beginning to end.

Reference no: EM13819294

Questions Cloud

What is clean powers corporate social responsibility : What are the above stakeholders' interests for each ethical issue or concern you identified? What are the stakeholders’ responsibilities for each ethical issue or concern you identified? What are the possible decisions the corporation could make for ..
Specific visual work to analyze for your media analysis : Choose a specific visual work to analyze for your Media Analysis Project (MAP). Your project can be on any media; print, photography, television, film, the Internet, etc. You will explore this topic in detail by using the six perspectives
Compare at least three different software development method : Compare and contrast at least three different software development methods. Explain why the testing of software products is of great importance.
Managerial tasks in strategy execution : While companies must tailor their strategy-executing approaches to their particular situation, there are eight managerial tasks which are common elements in executing strategies
Investigation of identity theft or fraud : Investigation of Identity Theft or Fraud
Examine two issues of standardization in general for mnes : Examine two issues of standardization and localization in general for MNEs. Determine two ways in which an organization would benefit from standardization of IHRM activities.
Concepts of effective persuasion : In this assignment, you will write a research paper (5-6 pages) which will examine communication techniques, the use of power, and how the concepts of effective persuasion are applied to a specific situation
Examine two stages that an organization goes through : Examine two stages that an organization goes through as it grows internationally. Explain key reasons why a large MNE with a long international history and extensive cross-border operations might choose to standardize its IHRM practices.
Core market offerings and defining the product : From the case study, take a position on whether Tropicana did or did not make a major mistake in changing its product packaging. Next, suggest the next two (2) steps that you believe Tropicana should take in its branding strategy in order to count..

Reviews

Write a Review

Operating System Questions & Answers

  Information-level design for college requirements

Database at college is needed to support following requirements. Complete information-level design for this set of requirements. Use your own experience to find out any constraints you require which are not stated in problem

  Rights to privacy

Determine what rights to privacy do people have when using the Internet at home? Are their privacy rights limited? Do those same rights and limits exist at work? Describe your view.

  Mobile platforms and desktop computers

From the e-Activity, examine the need for BIOS on computing devices. Determine whether or not you believe all mobile platforms and desktop computers need BIOS. Justify your response with relevant examples and sources.

  File systems on linux vs. ntfs file systems

List what characters are absolutely not allowed for ext4 file systems on Linux vs. NTFS file systems on Windows in a plain text document.

  Computer forensics it is likely a forensics investigator

it is likely a forensics investigator will encounter all of the primary operating systems available. the similarities

  Questiona i explain the following terms in relation to

questiona i explain the following terms in relation to linear programming problems-1 decision variables2 objective

  Match the os mechanisms on the left to the hardware support

Match the OS mechanisms on the left to the hardware support specific for each mechanism on the right.

  Describe the specific security concerns or risks

Describe the specific security concerns or risks that your chosen operating system is exposed to and how you plan to mitigate the risk that each one presents.

  Question about network design

Sterling Corporation wishes you to create a network infrastructure for them. They have 5-divisions with many hundred users at each division across the US.

  When using handheld devices it is not the same as on a

when using handheld devices it is not the same as on a computer. describe the similarities and differences in the

  Set of three uml class relationship diagrams

Prepare a set of three UML class relationship diagrams highlighting important relations among the discovered classes. Each diagram should give a coherent picture of relations among 3-5 classes.

  Security and data protection systems

Determine what fault tolerance, security, and information protection systems and procedures do you recommend be instituted on and for the corporation's network from the hypothetical condition below?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd