Response to an incident involving a computer

Assignment Help Basic Computer Science
Reference no: EM13819798

As the security representative for Computers, Security, and Investigations Inc. (CSII) in Centervale, you are the first responder to an emergency telephone call reporting that someone inside the computer lab may have been accessing child pornography. The security policy requires that you, as the first responder, investigate and document incidents fully.

As the first responder, you notify your immediate supervisor and close the lab for the rest of the day. Your supervisor, the chief security officer (CSO), requests a 6- to 8-page comprehensive report that details the situation and your actions as the first responder. You also consider contacting the director of the information technology (IT) department and the local authorities.

You are a security professional and not a law enforcement officer. You realize, however, that your work as the first responder is important for corporate responsibilities and further legal considerations. You are aware that your documentation could greatly affect the corporate policies and the prosecution of the individual.

What considerations will your documentation present for the corporation? What considerations will your documentation present for law enforcement? Please itemize how this can affect both entities.

Situational Information:

Each person that enters the library must sign in and sign out of the computer lab in the library.

Each person's identification is not verified by anyone.

There are no cameras in the computer lab, but there are cameras at the main entries and exits of the building.

Several potential witnesses were within the lab when the computers worked, and then suddenly stopped working.

No one touched the computer since the individual left the laboratory.

Several of the witnesses can identify the individual but not by name-blue jeans, a white T-shirt, black sneakers, a short haircut, no facial hair, and Caucasian male.

A thumb drive was left in the computer by the suspect, but the librarian touched the thumb drive.

Here's What You Need to Do . . .

Assume you were assigned the task of conducting a thorough investigation. Analyzing evidence from the scenario and using research from your course readings, complete a 6- to 8-page comprehensive report of the situation:

Identify the type of computer crime that may have occurred. Make sure to include an explanation of all computer components that are involved.

Describe the procedures that you would take to preserve the computer evidence at the scene.

Describe and sketch the scene.

Describe whom would you speak to or interview.

List what investigative questions you would ask the witnesses, victims, and perpetrator.

Explain other procedures you may take in order to investigate this case.

Outline the approximate timeline of events.

Describe what the witnesses saw or heard.

Describe the entities that were contacted.

Explain everything you did as the first responder to the scene and outline the importance of your actions.

Analyze the legal considerations and liabilities of law enforcement agencies in this situation.

Make recommendations for countermeasures and future protection against a similar incident.

Reference no: EM13819798

Questions Cloud

Modeled with a linear inequality : Think of a situation that can be modeled with a linear inequality. This must be a situation where more than one possible solution is acceptable. Describe your situation and why more than one solution is possible. Write an inequality to model the situ..
Examine the broad environmental trends : Write a Start the report with a brief introduction of what you intend to discuss above.Following the introduction, examine the broad environmental trends within which the two companies operate. Also focus on the stage of the industry (embryonic, grow..
What is the characteristic polynomial of a : dim(ker(A-3I)^2)=4 dim(ker(A-3I)^3)=5 What is the characteristic polynomial of A? what is the minimal polynomial of A?
Linear programming case study : It will be a problem with at least three (3) constraints and at least two (2) decision variables. The problem will be bounded and feasible. It will also have a single optimum solution (in other words, it won't have alternate optimal solutions).
Response to an incident involving a computer : Response to an Incident Involving a Computer
Solve the system of equations : Solve the following system of equations 1,      x+2y=2          -4x+3y=25
Determine an appropriate certification for the industry : Determine an appropriate certification for the industry you are currently employed in. Briefly describe the certification requirements, identifying the benefits in obtaining the certification and possible hurdles for a company.
Describe the open systems interconnection : Describe the Open Systems Interconnection
Drive the total cost of procurement down : The concept of reverse auctions has become popular to drive the total cost of procurement down. Discuss how reverse auctions might be a good fit for some supplies and not for other supplies.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd