SlideShare a Scribd company logo
1 of 7
Straver CIS 417 Week 10 Term. Paper
Investigating Data Theft
To purchase this material click below link
http://www.assignmentcloud.com/cis-417
-strayer/cis-417 -week- 10-term-paper-
investigating-data-theft-new
For more classes visit
www.assignmentcloud.com
www.assignmentcloud.com/
CIS 417 Week 10 Term Paper Investigating
Data Theft
Term Paper: Investigating Data Theft
Due Week 10 and worth 150 points
Suppose a large aerospace engineering
firm has immediately hired you as a
consultant to investigate a potential
violation of corporate policy and data
theft. You have been informed that an
employee may have been using corporate
email to send confidential corporate
information to one or more personal
email accounts, which may or may not
belong to him. You have been told that this
artio,, tas beenhapp
eningead, b
usmess
day
for the last 13 days and the employee
■ m m
is unaware of any suspicion.
Write an eight to ten (8-10) page paper in
which you:
1. Explain, in detail, the initial actions you
would take based on the provided
information including formal plans to
preserve the crime scene(s) and eventual
transportation of evidence to a lab.
2. Analyze the physical and logical places
where you would look for potential
evidence on the suspect's computer(s)
and / or network servers.
3. Describe, in detail, how you proceed
with the email investigation, including the
review of email headers and tracing.
4. Describe the processes that would be
utilized in order to recover data that may
have been deleted from the suspect's
w^avv.^^si{|eiugifro
m)th
os^a.(ct^m/
5. Identify the tools you would use to
perform your investigation from beginning
to end based on the information you have
on the incident. Provide a brief overview of
each tool, to include:
• A description of the tool.
• How you would use the tool in the
investigation.
• How the tool helps the investigation
and the evidence you expect it to
provide.
• Why you believe the evidence the tool
provides is critical to the investigation.
• Use at least five (5) quality resources
in this assignment. Note:Wikipedia and
similar Websites do not qualify as quality
resources.
WVYour assignment must follow these
formatting requirements:
• Be typed, double spaced, using Times
New Roman font (size 12), with one-
inch
margins on all sides; citations and
references must follow APA or school-
specific format. Check with your
professor for any additional
instructions.
• Include a cover page containing the
title of the assignment, the student's
name, the
professor's name, the course title, and the
date. The cover page and the reference
page are not included in the required
assignment page length.
The specific course learning outcomes
associated with this assignment are:
• Identify the role of computer forensics
in responding to crimes and solving
business
www.assifhallenges
-
• Outline system forensics issues, laws,
and skills.
• Examine and explain the evidence life
cycle.
• Identify the procurement of evidence in
physical and virtualized environments.
• Analyze the impact of sequestration on
the evidence-gathering process.
Develop plans that collect evidence in
network and email environments.
• Examine automated digital forensic
analysis.
• Use technology and information
resources to research issues in
computer
forensics.• Write clearly and concisely about
computer forensics topics using proper
Develop plans that collect evidence in
network and email environments.
• Examine automated digital forensic
analysis.
• Use technology and information
resources to research issues in
computer
forensics.• Write clearly and concisely about
computer forensics topics using proper

More Related Content

Similar to Strayer cis-417-week-10-term-paper-investigating-data-theft

FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docxFINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
tjane3
 

Similar to Strayer cis-417-week-10-term-paper-investigating-data-theft (20)

Cis 562 Extraordinary Success/newtonhelp.com
Cis 562 Extraordinary Success/newtonhelp.com  Cis 562 Extraordinary Success/newtonhelp.com
Cis 562 Extraordinary Success/newtonhelp.com
 
Strayer cis-417-week-6-assignment-3-securing-the-scene-new
Strayer cis-417-week-6-assignment-3-securing-the-scene-newStrayer cis-417-week-6-assignment-3-securing-the-scene-new
Strayer cis-417-week-6-assignment-3-securing-the-scene-new
 
Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-data
 
Cis 417 Success Begins / snaptutorial.com
Cis 417 Success Begins / snaptutorial.comCis 417 Success Begins / snaptutorial.com
Cis 417 Success Begins / snaptutorial.com
 
Cis 417 Technology levels--snaptutorial.com
Cis 417 Technology levels--snaptutorial.comCis 417 Technology levels--snaptutorial.com
Cis 417 Technology levels--snaptutorial.com
 
CIS 560 Life of the Mind/newtonhelp.com   
CIS 560 Life of the Mind/newtonhelp.com   CIS 560 Life of the Mind/newtonhelp.com   
CIS 560 Life of the Mind/newtonhelp.com   
 
CIS 560 Imagine Your Future/newtonhelp.com   
CIS 560 Imagine Your Future/newtonhelp.com   CIS 560 Imagine Your Future/newtonhelp.com   
CIS 560 Imagine Your Future/newtonhelp.com   
 
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
 
CIS 560 Inspiring Innovation/tutorialrank.com
 CIS 560 Inspiring Innovation/tutorialrank.com CIS 560 Inspiring Innovation/tutorialrank.com
CIS 560 Inspiring Innovation/tutorialrank.com
 
CIS 560 Focus Dreams/newtonhelp.com
CIS 560 Focus Dreams/newtonhelp.comCIS 560 Focus Dreams/newtonhelp.com
CIS 560 Focus Dreams/newtonhelp.com
 
Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7
 
Strayer cis-417-week-3-case-study-1-btk-new
Strayer cis-417-week-3-case-study-1-btk-newStrayer cis-417-week-3-case-study-1-btk-new
Strayer cis-417-week-3-case-study-1-btk-new
 
Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2
 
Acc 571 week 2 assignment 1 strayer
Acc 571 week 2 assignment 1   strayerAcc 571 week 2 assignment 1   strayer
Acc 571 week 2 assignment 1 strayer
 
Strayer cis-417-week-7-case-study-3
Strayer cis-417-week-7-case-study-3Strayer cis-417-week-7-case-study-3
Strayer cis-417-week-7-case-study-3
 
CIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comCIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.com
 
CIS 560 Effective Communication - tutorialrank.com
CIS 560 Effective Communication - tutorialrank.comCIS 560 Effective Communication - tutorialrank.com
CIS 560 Effective Communication - tutorialrank.com
 
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docxFINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
FINAL PROJECT - Investigative Conclusion and TestimonyNo d.docx
 
i need this paper written 2.docx
i need this paper written 2.docxi need this paper written 2.docx
i need this paper written 2.docx
 

More from infinityend3

More from infinityend3 (20)

Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
 
Strayer cis-505-week-2-assignment-1-standards-research
Strayer cis-505-week-2-assignment-1-standards-researchStrayer cis-505-week-2-assignment-1-standards-research
Strayer cis-505-week-2-assignment-1-standards-research
 
Strayer cis-505-all-assignments
Strayer cis-505-all-assignmentsStrayer cis-505-all-assignments
Strayer cis-505-all-assignments
 
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
 
Strayer cis-499-week-2-project-deliverable-1
Strayer cis-499-week-2-project-deliverable-1Strayer cis-499-week-2-project-deliverable-1
Strayer cis-499-week-2-project-deliverable-1
 
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-newStrayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
 
Strayer cis-438-week-10-term-paper-security-regulation-compliance
Strayer cis-438-week-10-term-paper-security-regulation-complianceStrayer cis-438-week-10-term-paper-security-regulation-compliance
Strayer cis-438-week-10-term-paper-security-regulation-compliance
 
Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4
 
Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...
Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...
Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...
 
Strayer cis-438-week-4-assignment-2
Strayer cis-438-week-4-assignment-2Strayer cis-438-week-4-assignment-2
Strayer cis-438-week-4-assignment-2
 
Strayer cis-438-week-3-assignment-1-privacy
Strayer cis-438-week-3-assignment-1-privacyStrayer cis-438-week-3-assignment-1-privacy
Strayer cis-438-week-3-assignment-1-privacy
 
Strayer cis-438-week-2-case-study-1
Strayer cis-438-week-2-case-study-1Strayer cis-438-week-2-case-study-1
Strayer cis-438-week-2-case-study-1
 
Stayer cis-443-week-10-term-paper
Stayer cis-443-week-10-term-paperStayer cis-443-week-10-term-paper
Stayer cis-443-week-10-term-paper
 
Stayer cis-443-week-9-case-study-2
Stayer cis-443-week-9-case-study-2Stayer cis-443-week-9-case-study-2
Stayer cis-443-week-9-case-study-2
 
Stayer cis-443-week-8-assignment-4
Stayer cis-443-week-8-assignment-4Stayer cis-443-week-8-assignment-4
Stayer cis-443-week-8-assignment-4
 
Stayer cis-443-week-7-assignment-3
Stayer cis-443-week-7-assignment-3Stayer cis-443-week-7-assignment-3
Stayer cis-443-week-7-assignment-3
 
Stayer cis-443-week-6-assignment-2
Stayer cis-443-week-6-assignment-2Stayer cis-443-week-6-assignment-2
Stayer cis-443-week-6-assignment-2
 
cis 443 week 4 case study 1 agile in practice an agile success story new,stra...
cis 443 week 4 case study 1 agile in practice an agile success story new,stra...cis 443 week 4 case study 1 agile in practice an agile success story new,stra...
cis 443 week 4 case study 1 agile in practice an agile success story new,stra...
 
Cis 421-week-10-term-paper
Cis 421-week-10-term-paperCis 421-week-10-term-paper
Cis 421-week-10-term-paper
 
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
Cis 421-week-7-assignment-3-component-interface-for-an-emergency-control-room...
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Strayer cis-417-week-10-term-paper-investigating-data-theft

  • 1. Straver CIS 417 Week 10 Term. Paper Investigating Data Theft To purchase this material click below link http://www.assignmentcloud.com/cis-417 -strayer/cis-417 -week- 10-term-paper- investigating-data-theft-new For more classes visit www.assignmentcloud.com www.assignmentcloud.com/ CIS 417 Week 10 Term Paper Investigating Data Theft Term Paper: Investigating Data Theft Due Week 10 and worth 150 points
  • 2. Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this artio,, tas beenhapp eningead, b usmess day for the last 13 days and the employee ■ m m is unaware of any suspicion. Write an eight to ten (8-10) page paper in which you: 1. Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab.
  • 3. 2. Analyze the physical and logical places where you would look for potential evidence on the suspect's computer(s) and / or network servers. 3. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing. 4. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect's w^avv.^^si{|eiugifro m)th os^a.(ct^m/ 5. Identify the tools you would use to perform your investigation from beginning to end based on the information you have on the incident. Provide a brief overview of each tool, to include: • A description of the tool. • How you would use the tool in the investigation.
  • 4. • How the tool helps the investigation and the evidence you expect it to provide. • Why you believe the evidence the tool provides is critical to the investigation. • Use at least five (5) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources. WVYour assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one- inch margins on all sides; citations and references must follow APA or school- specific format. Check with your professor for any additional instructions. • Include a cover page containing the title of the assignment, the student's name, the
  • 5. professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: • Identify the role of computer forensics in responding to crimes and solving business www.assifhallenges - • Outline system forensics issues, laws, and skills. • Examine and explain the evidence life cycle. • Identify the procurement of evidence in physical and virtualized environments. • Analyze the impact of sequestration on the evidence-gathering process.
  • 6. Develop plans that collect evidence in network and email environments. • Examine automated digital forensic analysis. • Use technology and information resources to research issues in computer forensics.• Write clearly and concisely about computer forensics topics using proper
  • 7. Develop plans that collect evidence in network and email environments. • Examine automated digital forensic analysis. • Use technology and information resources to research issues in computer forensics.• Write clearly and concisely about computer forensics topics using proper