Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

As the security representative for Computers, Security, and Investigations Inc. (CSII) in Centervale, you are the first responder to an emergency telephone call reporting that someone inside the computer lab may have been accessing child pornography. The security policy requires that you, as the first responder, investigate and document incidents fully.

As the first responder, you notify your immediate supervisor and close the lab for the rest of the day. Your supervisor, the chief security officer (CSO), requests a 6- to 8-page comprehensive report that details the situation and your actions as the first responder. You also consider contacting the director of the information technology (IT) department and the local authorities.

You are a security professional and not a law enforcement officer. You realize, however, that your work as the first responder is important for corporate responsibilities and further legal considerations. You are aware that your documentation could greatly affect the corporate policies and the prosecution of the individual.

What considerations will your documentation present for the corporation? What considerations will your documentation present for law enforcement? Please itemize how this can affect both entities.

Situational Information:

Each person that enters the library must sign in and sign out of the computer lab in the library.

Each person's identification is not verified by anyone.

There are no cameras in the computer lab, but there are cameras at the main entries and exits of the building.

Several potential witnesses were within the lab when the computers worked, and then suddenly stopped working.

No one touched the computer since the individual left the laboratory.

Several of the witnesses can identify the individual but not by name-blue jeans, a white T-shirt, black sneakers, a short haircut, no facial hair, and Caucasian male.

A thumb drive was left in the computer by the suspect, but the librarian touched the thumb drive.

Here's What You Need to Do . . .

Assume you were assigned the task of conducting a thorough investigation. Analyzing evidence from the scenario and using research from your course readings, complete a 6- to 8-page comprehensive report of the situation:

Identify the type of computer crime that may have occurred. Make sure to include an explanation of all computer components that are involved.

Describe the procedures that you would take to preserve the computer evidence at the scene.

Describe and sketch the scene.

Describe whom would you speak to or interview.

List what investigative questions you would ask the witnesses, victims, and perpetrator.

Explain other procedures you may take in order to investigate this case.

Outline the approximate timeline of events.

Describe what the witnesses saw or heard.

Describe the entities that were contacted.

Explain everything you did as the first responder to the scene and outline the importance of your actions.

Analyze the legal considerations and liabilities of law enforcement agencies in this situation.

Make recommendations for countermeasures and future protection against a similar incident.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91389704
  • Price:- $45

Guranteed 36 Hours Delivery, In Price:- $45

Have any Question?


Related Questions in Computer Engineering

Sql for databasebuild a query of all students on athletic

Sql for database Build a query of all students on athletic scholarship. Additionally, produce a report with descriptive report and column headings. Be sure there is enough data to prove the selection and sort worked as r ...

What is the name of the text file on a windows computer

What is the name of the text file on a Windows computer that may store DNS to IP address mappings?

A chemistry student needsnbsp150 ml of acetone for an

A chemistry student needs 15.0 mL of acetone for an experiment. By consulting the  CRC Handbook of Chemistry and Physics , the student discovers that the density of acetone is 0.790 g.cm^-3. Calculate the mass of acetone ...

Question you are a software engineer working at a large

Question You are a software engineer working at a large publicly-traded corporation, where a colleague invents a new kind of compiler. Your managers see it as a huge potential cash cow. How would you respond in a way tha ...

Question hypothetically speaking you are assigned to a

Question: Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for Campbellsville University Staff and Faculty. Only two of the three votes are required to pass this policy. In this ...

Question what specific benefits does the ebk provide to any

Question : What specific benefits does the EBK provide to any organization? Why are those particular benefits important to the overall organization? Specifically, what is it about the EBK that makes it particularly usefu ...

To speed up memory access caching is typically used a

To speed up memory access, caching is typically used. A memory cache is a small but fast memory where data recently accessed is kept in anticipation of future references. When an access is made, if the data is in the cac ...

For this assignment you will produce a reflection paper

For this assignment, you will produce a reflection paper based on your experience in the BSIT program, and in preparation for developing a professional portfolio starting next week. The purpose of the reflection paper is ...

Question sms imessage and whatsapp are all smartphone

Question : SMS, iMessage, and WhatsApp are all smartphone real-time messaging systems. After doing some research on the Internet, for each of these systems write one paragraph about the protocols they use. Then write a p ...

The second programming project involves writing a program

The second programming project involves writing a program that accepts an arithmetic expression of unsigned integers in postfix notation and builds the arithmetic expression tree that represents that expression. From tha ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As