SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Buy here:
http://theperfecthomework.com/ccjs-321-project-1-md/
Project 1
Scenario Characters:
You: Information Security Specialist, Greenwood Company
Hubert Jenkins: Human Resources Director, Greenwood Company
Mike McBride: (former) engineer, New Product’s Division, Greenwood Co.
**Characters will carry through Project 1, 2 and the Final Project. However, please remain
conscience of who you are/what roll you play in EACH project and in regards to specific
questions.
For the purposes of this project, imagine you are an Information Security (InfoSec)
Specialist, an employee of the Greenwood Company, assigned to the company’s Incident
Response Team.
In this case, you have been notified by Mr. Hubert Jenkins, Human Resources Director for
the Greenwood Company, that the company has just terminated Mr. Mike McBride, a former
engineer in the company’s New Products Division, for cause (consistent tardiness and
absences from work). Mr. Jenkins tells you that at Mr. McBride’s exit interview earlier that
day, the terminated employee made several statements to the effect of “it is okay because I
have a new job already and they were VERY happy to have me come from Greenwood, with
ALL I have to offer.” McBride’s statements made Mr. Jenkins fear he might be taking
Greenwood’s intellectual property with him to his new employer (undoubtedly a Greenwood
competitor). In particular, Mr. Jenkins is worried about the loss of the source code for
“Product X,” which the company is counting on to earn millions in revenue over the next
three years. Mr. Jenkins provides you a copy of the source code to use in your investigation.
Lastly, Mr. Jenkins tells you to remember that the Company wants to retain the option to
refer the investigation to law enforcement in the future, so anything you do should be with
thought about later potential admissibility in court.
The 4​th​
Amendment to the U.S. Constitution reads, “The right of the people to be secure in
their persons, houses, papers, and effects, against unreasonable searches and seizures,
shall not be violated, and no warrants shall issue, but upon probable cause, supported by
oath or affirmation, and particularly describing the place to be searched, and the persons or
things to be seized.” While the 4​th​
Amendment is most commonly interpreted to only
affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal
investigation is a possibility (and the Company has no desire to be named in a civil lawsuit)
means you must consider its effect your actions.
With the above scenario in mind, ​thoroughly​ answer the following questions (in paragraph
format, properly citing outside research, where appropriate).
1. Prior to any incident happening, it is important for any company to implement a
“forensic readiness” plan. Discuss the benefits of a forensic readiness plan and
name what you believe are the top 3 requirements to establish forensic
readiness within a private sector business. Support your answers. (Please note
that while cyber security and digital forensics have overlaps in incident response
preparation, please limit your answers here to forensic readiness in the digital
forensic arena, not cyber security.)
2. Mr. Jenkins, out of concern for the theft/sharing of the “Product X” source code,
is pushing requesting that you or your supervisor start searching the areas in
which Mr. McBride had access within the building. Can (or Mr. McBrides’s
supervisor) search McBrides’s assigned locker in the Company’s on-site gym for
digital evidence? Support your answer.
3. Can (or Mr. McBrides’s supervisor) use a master key to search McBrides’s
locked desk for digital evidence after McBride has left the premises? Support
your answer.
4. The police have not been called or involved yet, however, Ms. Jenkins asks how
involving the police will change your incident response. Develop a response to
Mr. Jenkins that addresses how the parameters of search and seizure will
change by involving the police in the investigation at this time. Support your
answer.
5. There is a page in the Company’s “Employee Handbook” that states that
anything brought onto the Company’s property, including the employees
themselves, is subject to random search for items belonging to the Company.
There is a space for the employee to acknowledge receipt of this notice. Mr.
McBride has a copy of the handbook but never signed the page. Does that
matter? Explain.
6. Greenwood Company uses a security checkpoint at the entrance to the building.
A sign adjacent to the checkpoint states that the purpose of the checkpoint is for
security staff to check for weapons or other materials that may be detrimental to
the working environment or employee safety. Screening is casual and usually
consists of verification of an employee’s Company ID card. Can security staff at
this checkpoint be directed to open Mr. McBrides’s briefcase and seize any
potential digital evidence? Support your answer.
7. You know that it is important to document the details of your investigation if the
company wants to insure admissibility of any evidence collected in the future.
However, Mr. Jenkins has never heard of the term “chain of custody.” Write an
explanation to Mr. Jenkins of what the chain of custody is, why it is important,
and what could occur if the chain of custody is not documented. Support your
answer.

Weitere ähnliche Inhalte

Ähnlich wie CCJS 321 PROJECT 1 (MD)

Social media competence and ethics Oklahoma
Social media competence and ethics OklahomaSocial media competence and ethics Oklahoma
Social media competence and ethics OklahomaJon Sutten
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecuritynathan-axonius
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information securityMajor Hayden
 
LAW 531 MART Education Counseling--law531mart.com
LAW 531 MART Education Counseling--law531mart.comLAW 531 MART Education Counseling--law531mart.com
LAW 531 MART Education Counseling--law531mart.comKeatonJennings88
 
How To Write A Thesis Statement In 5 Simple Steps
How To Write A Thesis Statement In 5 Simple StepsHow To Write A Thesis Statement In 5 Simple Steps
How To Write A Thesis Statement In 5 Simple StepsLiz Harris
 
LAW 531 TUTOR Education Counseling--law531tutor.com
LAW 531 TUTOR Education Counseling--law531tutor.comLAW 531 TUTOR Education Counseling--law531tutor.com
LAW 531 TUTOR Education Counseling--law531tutor.comKeatonJennings88
 
ISOL 535 CryptographyCompany OrganizationYour grou.docx
ISOL 535 CryptographyCompany  OrganizationYour grou.docxISOL 535 CryptographyCompany  OrganizationYour grou.docx
ISOL 535 CryptographyCompany OrganizationYour grou.docxvrickens
 
TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015sllongo3
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330Jim Kramer
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queogglili
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistMorrison & Foerster
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
i need this paper written 2.docx
i need this paper written 2.docxi need this paper written 2.docx
i need this paper written 2.docxwrite4
 

Ähnlich wie CCJS 321 PROJECT 1 (MD) (20)

Social media competence and ethics Oklahoma
Social media competence and ethics OklahomaSocial media competence and ethics Oklahoma
Social media competence and ethics Oklahoma
 
Entrepreneurship
EntrepreneurshipEntrepreneurship
Entrepreneurship
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
LAW 531 MART Education Counseling--law531mart.com
LAW 531 MART Education Counseling--law531mart.comLAW 531 MART Education Counseling--law531mart.com
LAW 531 MART Education Counseling--law531mart.com
 
LabMD ALJ Decision
LabMD ALJ DecisionLabMD ALJ Decision
LabMD ALJ Decision
 
How To Write A Thesis Statement In 5 Simple Steps
How To Write A Thesis Statement In 5 Simple StepsHow To Write A Thesis Statement In 5 Simple Steps
How To Write A Thesis Statement In 5 Simple Steps
 
LAW 531 TUTOR Education Counseling--law531tutor.com
LAW 531 TUTOR Education Counseling--law531tutor.comLAW 531 TUTOR Education Counseling--law531tutor.com
LAW 531 TUTOR Education Counseling--law531tutor.com
 
ISOL 535 CryptographyCompany OrganizationYour grou.docx
ISOL 535 CryptographyCompany  OrganizationYour grou.docxISOL 535 CryptographyCompany  OrganizationYour grou.docx
ISOL 535 CryptographyCompany OrganizationYour grou.docx
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
 
TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
i need this paper written 2.docx
i need this paper written 2.docxi need this paper written 2.docx
i need this paper written 2.docx
 

Mehr von JanuMorandy

CMIS 102 HOMEWORK 2
CMIS 102 HOMEWORK 2CMIS 102 HOMEWORK 2
CMIS 102 HOMEWORK 2JanuMorandy
 
CMIS 102 HOMEWORK 3
CMIS 102 HOMEWORK 3CMIS 102 HOMEWORK 3
CMIS 102 HOMEWORK 3JanuMorandy
 
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...JanuMorandy
 
CMIS 102 FINAL PROJECT
CMIS 102 FINAL PROJECTCMIS 102 FINAL PROJECT
CMIS 102 FINAL PROJECTJanuMorandy
 
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...JanuMorandy
 
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...JanuMorandy
 
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...JanuMorandy
 
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...JanuMorandy
 
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...JanuMorandy
 
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEW
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEWCC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEW
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEWJanuMorandy
 
CASH PROVIDED BY OPERATING ACTIVITIES:
CASH PROVIDED BY OPERATING ACTIVITIES:CASH PROVIDED BY OPERATING ACTIVITIES:
CASH PROVIDED BY OPERATING ACTIVITIES:JanuMorandy
 
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...JanuMorandy
 
BMGT 485 PAPER 3 FINAL PROJECT
BMGT 485 PAPER 3 FINAL PROJECTBMGT 485 PAPER 3 FINAL PROJECT
BMGT 485 PAPER 3 FINAL PROJECTJanuMorandy
 
BMGT 496 FINAL PROJECT
BMGT 496 FINAL PROJECTBMGT 496 FINAL PROJECT
BMGT 496 FINAL PROJECTJanuMorandy
 
BMGT 464 WEEK 1 ASSIGNMENT
BMGT 464 WEEK 1 ASSIGNMENTBMGT 464 WEEK 1 ASSIGNMENT
BMGT 464 WEEK 1 ASSIGNMENTJanuMorandy
 
BMGT 485 ASSIGNMENT 2
BMGT 485 ASSIGNMENT 2BMGT 485 ASSIGNMENT 2
BMGT 485 ASSIGNMENT 2JanuMorandy
 
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSISBMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSISJanuMorandy
 
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSISBMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSISJanuMorandy
 
BMGT 380 FINAL EXAM - 2016 VERSION
BMGT 380 FINAL EXAM - 2016 VERSIONBMGT 380 FINAL EXAM - 2016 VERSION
BMGT 380 FINAL EXAM - 2016 VERSIONJanuMorandy
 

Mehr von JanuMorandy (20)

CMIS 102 HOMEWORK 2
CMIS 102 HOMEWORK 2CMIS 102 HOMEWORK 2
CMIS 102 HOMEWORK 2
 
CMIS 102 HOMEWORK 3
CMIS 102 HOMEWORK 3CMIS 102 HOMEWORK 3
CMIS 102 HOMEWORK 3
 
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...
 
CMIS 102 FINAL PROJECT
CMIS 102 FINAL PROJECTCMIS 102 FINAL PROJECT
CMIS 102 FINAL PROJECT
 
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...
 
CHM 2045 EXAM 5
CHM 2045 EXAM 5CHM 2045 EXAM 5
CHM 2045 EXAM 5
 
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...
 
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...
 
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...
 
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
 
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEW
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEWCC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEW
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEW
 
CASH PROVIDED BY OPERATING ACTIVITIES:
CASH PROVIDED BY OPERATING ACTIVITIES:CASH PROVIDED BY OPERATING ACTIVITIES:
CASH PROVIDED BY OPERATING ACTIVITIES:
 
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...
 
BMGT 485 PAPER 3 FINAL PROJECT
BMGT 485 PAPER 3 FINAL PROJECTBMGT 485 PAPER 3 FINAL PROJECT
BMGT 485 PAPER 3 FINAL PROJECT
 
BMGT 496 FINAL PROJECT
BMGT 496 FINAL PROJECTBMGT 496 FINAL PROJECT
BMGT 496 FINAL PROJECT
 
BMGT 464 WEEK 1 ASSIGNMENT
BMGT 464 WEEK 1 ASSIGNMENTBMGT 464 WEEK 1 ASSIGNMENT
BMGT 464 WEEK 1 ASSIGNMENT
 
BMGT 485 ASSIGNMENT 2
BMGT 485 ASSIGNMENT 2BMGT 485 ASSIGNMENT 2
BMGT 485 ASSIGNMENT 2
 
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSISBMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
 
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSISBMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
 
BMGT 380 FINAL EXAM - 2016 VERSION
BMGT 380 FINAL EXAM - 2016 VERSIONBMGT 380 FINAL EXAM - 2016 VERSION
BMGT 380 FINAL EXAM - 2016 VERSION
 

Kürzlich hochgeladen

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 

Kürzlich hochgeladen (20)

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 

CCJS 321 PROJECT 1 (MD)

  • 1. Buy here: http://theperfecthomework.com/ccjs-321-project-1-md/ Project 1 Scenario Characters: You: Information Security Specialist, Greenwood Company Hubert Jenkins: Human Resources Director, Greenwood Company Mike McBride: (former) engineer, New Product’s Division, Greenwood Co. **Characters will carry through Project 1, 2 and the Final Project. However, please remain conscience of who you are/what roll you play in EACH project and in regards to specific questions. For the purposes of this project, imagine you are an Information Security (InfoSec) Specialist, an employee of the Greenwood Company, assigned to the company’s Incident Response Team. In this case, you have been notified by Mr. Hubert Jenkins, Human Resources Director for the Greenwood Company, that the company has just terminated Mr. Mike McBride, a former engineer in the company’s New Products Division, for cause (consistent tardiness and absences from work). Mr. Jenkins tells you that at Mr. McBride’s exit interview earlier that day, the terminated employee made several statements to the effect of “it is okay because I have a new job already and they were VERY happy to have me come from Greenwood, with ALL I have to offer.” McBride’s statements made Mr. Jenkins fear he might be taking Greenwood’s intellectual property with him to his new employer (undoubtedly a Greenwood competitor). In particular, Mr. Jenkins is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next three years. Mr. Jenkins provides you a copy of the source code to use in your investigation. Lastly, Mr. Jenkins tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in the future, so anything you do should be with thought about later potential admissibility in court.
  • 2. The 4​th​ Amendment to the U.S. Constitution reads, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” While the 4​th​ Amendment is most commonly interpreted to only affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal investigation is a possibility (and the Company has no desire to be named in a civil lawsuit) means you must consider its effect your actions. With the above scenario in mind, ​thoroughly​ answer the following questions (in paragraph format, properly citing outside research, where appropriate). 1. Prior to any incident happening, it is important for any company to implement a “forensic readiness” plan. Discuss the benefits of a forensic readiness plan and name what you believe are the top 3 requirements to establish forensic readiness within a private sector business. Support your answers. (Please note that while cyber security and digital forensics have overlaps in incident response preparation, please limit your answers here to forensic readiness in the digital forensic arena, not cyber security.) 2. Mr. Jenkins, out of concern for the theft/sharing of the “Product X” source code, is pushing requesting that you or your supervisor start searching the areas in which Mr. McBride had access within the building. Can (or Mr. McBrides’s supervisor) search McBrides’s assigned locker in the Company’s on-site gym for digital evidence? Support your answer. 3. Can (or Mr. McBrides’s supervisor) use a master key to search McBrides’s locked desk for digital evidence after McBride has left the premises? Support your answer. 4. The police have not been called or involved yet, however, Ms. Jenkins asks how involving the police will change your incident response. Develop a response to Mr. Jenkins that addresses how the parameters of search and seizure will change by involving the police in the investigation at this time. Support your answer. 5. There is a page in the Company’s “Employee Handbook” that states that anything brought onto the Company’s property, including the employees themselves, is subject to random search for items belonging to the Company. There is a space for the employee to acknowledge receipt of this notice. Mr. McBride has a copy of the handbook but never signed the page. Does that matter? Explain. 6. Greenwood Company uses a security checkpoint at the entrance to the building. A sign adjacent to the checkpoint states that the purpose of the checkpoint is for security staff to check for weapons or other materials that may be detrimental to the working environment or employee safety. Screening is casual and usually consists of verification of an employee’s Company ID card. Can security staff at
  • 3. this checkpoint be directed to open Mr. McBrides’s briefcase and seize any potential digital evidence? Support your answer. 7. You know that it is important to document the details of your investigation if the company wants to insure admissibility of any evidence collected in the future. However, Mr. Jenkins has never heard of the term “chain of custody.” Write an explanation to Mr. Jenkins of what the chain of custody is, why it is important, and what could occur if the chain of custody is not documented. Support your answer.