What is the name of the file ann transferred

Assignment Help Management Information Sys
Reference no: EM133337772

Case: Anarchy-R-Us, Inc. suspects that one of their employees, Ann Dercover, is really a secret agent working for their competitor. Ann has access to the company's prize asset, the secret recipe. Security staff are worried that Ann may try to leak the company's secret recipe.

Security staff have been monitoring Ann's activity for some time, but haven't found anything suspicious- until now. Today an unexpected laptop briefly appeared on the company wireless network. Staff hypothesize it may have been someone in the parking lot, because no strangers were seen in the building. Ann's computer, (192.168.1.158) sent IMs over the wireless
network to this computer. The rogue laptop disappeared shortly thereafter. "We have a packet capture of the activity," said security staff, "but we can't figure out what's going on. Can you help?"

Task :

You are the forensic investigator. Your mission is to figure out who Ann was IM-ing, what she sent, and recover evidence including:

1. What is the name of Ann's IM buddy?

2. What was the first comment in the captured IM conversation?

3. What is the name of the file Ann transferred?

4. What is the magic number of the file you want to extract (first four bytes)?

5. What was the MD5sum of the file?

6. What is the secret recipe?

Reference no: EM133337772

Questions Cloud

Discuss how physical security and computer security : MSCIA C795 Western Governors University Discuss an example of the document imaging environment and how it affects the practice of e-prescriptions
Debugging process evaluation : Evaluate how the debugging process can be used to benefit you to develop your application in the context of syntax error and semantic incompatibility.
Explain how ot network traffic analysis can help : Research and will compare/contrast IT security vs OT security. You will also explain how OT network traffic analysis can help in detecting OT attacks
Cloud-secure software development lifecycle : What activities occur during each of the phases of Cloud-Secure Software Development Lifecycle (SDLC) - Defining, Designing, Developing, Testing,
What is the name of the file ann transferred : What is the name of Ann's IM buddy? 2. What was the first comment in the captured IM conversation and What is the name of the file Ann transferred
What forces or reasons might lead you to delay disclosing : what forces or reasons might lead you to delay disclosing the breach to the public? Which of these are defensible? Which are not? Why
Electronic exchange of health data : Debate the pros and cons of eHEX (Health Information Exchanges) with respect to the privacy issues associated with the electronic exchange of health data.
Eight stages of cyber kill chain to prevent attack : Describe steps that should be taken at each of the eight stages of the cyber kill chain to prevent an attack.
Information security requirements for business continuity : Information security requirements for business continuity. These should be based upon clearly realised and authorised oblectives for information security

Reviews

Write a Review

Management Information Sys Questions & Answers

  Examine the importance of mobile systems

Distinguish the key differences between data, information, information technology, and information systems.

  Describe any cultural norms and values

Explain culture and subculture as you see them represented in the two families - how these concepts are represented in this scenario

  Search for available commercial applications

Using a Web browser, search for available commercial applications that use various forms of RAID technologies, such as RAID 0 through RAID 5.

  What are some advantages of using a cloud-based solution

Cloud computing has come into the marketplace over the past few years. What are some advantages of using a cloud-based solution? Would this be something your past or current organization could utilize? Why or why not?

  Network design and latencymr smith is the director of it at

network design and latencymr. smith is the director of it at a law firm located in downtown chicago. he needs to plan

  Describe benefit of reduced investment and proportional cost

Describe the benefit of Reduced Investment and Proportional Costs and explain the relationship of this benefit to the pay-for-use billing model.

  What are the benefits associated with an outsourcing effort

Write a 3-5 page paper that discusses the various aspects of outsourcing the IT function from an organization. What are the benefits associated with an outsourcing effort

  Create an excel spreadsheet or an open-source equivalent

Create a report to accompany the spreadsheet that recommends two tools based on your research. Justify your answer.

  Determine what an acceptable level of risk is

Explain how organizations determine what an "acceptable" level of risk is, and how this plays a role in risk management and continuity planning.

  How does data leakage occur in an organization

The focus of the research paper is Data Leakage. How does data leakage occur in an organization? What are the common causes of this problem? How would use address this troublesome trend? Use your textbook, internet, and other publications to re..

  What types of tools are used

Computer Forensics Presentation.Research the following topic:What types of tools are used?What techniques are used?

  Prepare a report on a topic - Internet Marketing

CN7008 - Global Sustainable ICT Management Assignment - Individual Learning Agreement (ILA), University of East London, UK. Prepare a report Internet Marketing

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd