Response to an incident involving a computer

Assignment Help Basic Computer Science
Reference no: EM13819798

As the security representative for Computers, Security, and Investigations Inc. (CSII) in Centervale, you are the first responder to an emergency telephone call reporting that someone inside the computer lab may have been accessing child pornography. The security policy requires that you, as the first responder, investigate and document incidents fully.

As the first responder, you notify your immediate supervisor and close the lab for the rest of the day. Your supervisor, the chief security officer (CSO), requests a 6- to 8-page comprehensive report that details the situation and your actions as the first responder. You also consider contacting the director of the information technology (IT) department and the local authorities.

You are a security professional and not a law enforcement officer. You realize, however, that your work as the first responder is important for corporate responsibilities and further legal considerations. You are aware that your documentation could greatly affect the corporate policies and the prosecution of the individual.

What considerations will your documentation present for the corporation? What considerations will your documentation present for law enforcement? Please itemize how this can affect both entities.

Situational Information:

Each person that enters the library must sign in and sign out of the computer lab in the library.

Each person's identification is not verified by anyone.

There are no cameras in the computer lab, but there are cameras at the main entries and exits of the building.

Several potential witnesses were within the lab when the computers worked, and then suddenly stopped working.

No one touched the computer since the individual left the laboratory.

Several of the witnesses can identify the individual but not by name-blue jeans, a white T-shirt, black sneakers, a short haircut, no facial hair, and Caucasian male.

A thumb drive was left in the computer by the suspect, but the librarian touched the thumb drive.

Here's What You Need to Do . . .

Assume you were assigned the task of conducting a thorough investigation. Analyzing evidence from the scenario and using research from your course readings, complete a 6- to 8-page comprehensive report of the situation:

Identify the type of computer crime that may have occurred. Make sure to include an explanation of all computer components that are involved.

Describe the procedures that you would take to preserve the computer evidence at the scene.

Describe and sketch the scene.

Describe whom would you speak to or interview.

List what investigative questions you would ask the witnesses, victims, and perpetrator.

Explain other procedures you may take in order to investigate this case.

Outline the approximate timeline of events.

Describe what the witnesses saw or heard.

Describe the entities that were contacted.

Explain everything you did as the first responder to the scene and outline the importance of your actions.

Analyze the legal considerations and liabilities of law enforcement agencies in this situation.

Make recommendations for countermeasures and future protection against a similar incident.

Reference no: EM13819798

Questions Cloud

Modeled with a linear inequality : Think of a situation that can be modeled with a linear inequality. This must be a situation where more than one possible solution is acceptable. Describe your situation and why more than one solution is possible. Write an inequality to model the situ..
Examine the broad environmental trends : Write a Start the report with a brief introduction of what you intend to discuss above.Following the introduction, examine the broad environmental trends within which the two companies operate. Also focus on the stage of the industry (embryonic, grow..
What is the characteristic polynomial of a : dim(ker(A-3I)^2)=4 dim(ker(A-3I)^3)=5 What is the characteristic polynomial of A? what is the minimal polynomial of A?
Linear programming case study : It will be a problem with at least three (3) constraints and at least two (2) decision variables. The problem will be bounded and feasible. It will also have a single optimum solution (in other words, it won't have alternate optimal solutions).
Response to an incident involving a computer : Response to an Incident Involving a Computer
Solve the system of equations : Solve the following system of equations 1,      x+2y=2          -4x+3y=25
Determine an appropriate certification for the industry : Determine an appropriate certification for the industry you are currently employed in. Briefly describe the certification requirements, identifying the benefits in obtaining the certification and possible hurdles for a company.
Describe the open systems interconnection : Describe the Open Systems Interconnection
Drive the total cost of procurement down : The concept of reverse auctions has become popular to drive the total cost of procurement down. Discuss how reverse auctions might be a good fit for some supplies and not for other supplies.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the needs of the organization

Describe the steps you would take to determine the needs of the organization (the discovery of the network devices

  The village of marengo conducted a census

But instead of writing your pseudocode/program for "fewer than 300" households, write your pseudocode/program for EXACTLY 7 households.

  Develop an i/o port decoder

Using a PLD, develop an I/O port decoder that generates the following high-bank I/O strobes: 300DH, 300BH, 00B6H, and 00EEH.

  Show by induction

Show by induction that n^5- n is divisible by 5 for all n ? 0.

  How many pages are needed to store the entire job

How many pages are needed to store the entire job?

  How is hardware different from software

what is a Web application? What are some features of a Web 2.0 site and how is hardware different from software?

  How do you write a program in visual basic

My problem is the program should pretty much erase the pervious series data points for the control limits for both charts and update the new value with the recalculated values, and I am not sure how to do this. Thank you!

  Inter-connected php pages for online shopping

The Registration Page (registration.php).  It has a header but has no registration button on the right. It will take the customer information (e.g., name, contact, etc.) and save them in Php session variables/array/object. At the submit button, it ve..

  Design the logic for a program

Modify the program so that if a participant has more than one record, you output the name only once, but you also output a count of the total number of classes the participant has taken.

  Assignment on the virtual memory manager

Most operating systems use a virtual memory manager (VMM) whose responsibility is to manage the relationship between the virtual organization of memory as seen by an application with the physical organization of memory from the operating system's ..

  The code be written by hand using a text editor

Demonstrate your ability to create a web site. Your web site should consist of at least 4 pages, a main page, an additional information page, a page containing form elements (such as a contact page), and one additional page of your choice.

  What is the size of a char and a string

What are the sizes in memory of other data types in C++? I mean, I know that a double is 8 bytes and an int is 4 bytes. What is the size of a Char and a String?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd