SlideShare a Scribd company logo
Buy here:
http://theperfecthomework.com/ccjs-321-project-1-md/
Project 1
Scenario Characters:
You: Information Security Specialist, Greenwood Company
Hubert Jenkins: Human Resources Director, Greenwood Company
Mike McBride: (former) engineer, New Product’s Division, Greenwood Co.
**Characters will carry through Project 1, 2 and the Final Project. However, please remain
conscience of who you are/what roll you play in EACH project and in regards to specific
questions.
For the purposes of this project, imagine you are an Information Security (InfoSec)
Specialist, an employee of the Greenwood Company, assigned to the company’s Incident
Response Team.
In this case, you have been notified by Mr. Hubert Jenkins, Human Resources Director for
the Greenwood Company, that the company has just terminated Mr. Mike McBride, a former
engineer in the company’s New Products Division, for cause (consistent tardiness and
absences from work). Mr. Jenkins tells you that at Mr. McBride’s exit interview earlier that
day, the terminated employee made several statements to the effect of “it is okay because I
have a new job already and they were VERY happy to have me come from Greenwood, with
ALL I have to offer.” McBride’s statements made Mr. Jenkins fear he might be taking
Greenwood’s intellectual property with him to his new employer (undoubtedly a Greenwood
competitor). In particular, Mr. Jenkins is worried about the loss of the source code for
“Product X,” which the company is counting on to earn millions in revenue over the next
three years. Mr. Jenkins provides you a copy of the source code to use in your investigation.
Lastly, Mr. Jenkins tells you to remember that the Company wants to retain the option to
refer the investigation to law enforcement in the future, so anything you do should be with
thought about later potential admissibility in court.
The 4​th​
Amendment to the U.S. Constitution reads, “The right of the people to be secure in
their persons, houses, papers, and effects, against unreasonable searches and seizures,
shall not be violated, and no warrants shall issue, but upon probable cause, supported by
oath or affirmation, and particularly describing the place to be searched, and the persons or
things to be seized.” While the 4​th​
Amendment is most commonly interpreted to only
affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal
investigation is a possibility (and the Company has no desire to be named in a civil lawsuit)
means you must consider its effect your actions.
With the above scenario in mind, ​thoroughly​ answer the following questions (in paragraph
format, properly citing outside research, where appropriate).
1. Prior to any incident happening, it is important for any company to implement a
“forensic readiness” plan. Discuss the benefits of a forensic readiness plan and
name what you believe are the top 3 requirements to establish forensic
readiness within a private sector business. Support your answers. (Please note
that while cyber security and digital forensics have overlaps in incident response
preparation, please limit your answers here to forensic readiness in the digital
forensic arena, not cyber security.)
2. Mr. Jenkins, out of concern for the theft/sharing of the “Product X” source code,
is pushing requesting that you or your supervisor start searching the areas in
which Mr. McBride had access within the building. Can (or Mr. McBrides’s
supervisor) search McBrides’s assigned locker in the Company’s on-site gym for
digital evidence? Support your answer.
3. Can (or Mr. McBrides’s supervisor) use a master key to search McBrides’s
locked desk for digital evidence after McBride has left the premises? Support
your answer.
4. The police have not been called or involved yet, however, Ms. Jenkins asks how
involving the police will change your incident response. Develop a response to
Mr. Jenkins that addresses how the parameters of search and seizure will
change by involving the police in the investigation at this time. Support your
answer.
5. There is a page in the Company’s “Employee Handbook” that states that
anything brought onto the Company’s property, including the employees
themselves, is subject to random search for items belonging to the Company.
There is a space for the employee to acknowledge receipt of this notice. Mr.
McBride has a copy of the handbook but never signed the page. Does that
matter? Explain.
6. Greenwood Company uses a security checkpoint at the entrance to the building.
A sign adjacent to the checkpoint states that the purpose of the checkpoint is for
security staff to check for weapons or other materials that may be detrimental to
the working environment or employee safety. Screening is casual and usually
consists of verification of an employee’s Company ID card. Can security staff at
this checkpoint be directed to open Mr. McBrides’s briefcase and seize any
potential digital evidence? Support your answer.
7. You know that it is important to document the details of your investigation if the
company wants to insure admissibility of any evidence collected in the future.
However, Mr. Jenkins has never heard of the term “chain of custody.” Write an
explanation to Mr. Jenkins of what the chain of custody is, why it is important,
and what could occur if the chain of custody is not documented. Support your
answer.

More Related Content

Similar to CCJS 321 PROJECT 1 (MD)

Social media competence and ethics Oklahoma
Social media competence and ethics OklahomaSocial media competence and ethics Oklahoma
Social media competence and ethics Oklahoma
Jon Sutten
 
Entrepreneurship
EntrepreneurshipEntrepreneurship
Entrepreneurship
NMIMS ASSIGNMENTS HELP
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
nathan-axonius
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
mccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
sleeperharwell
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
Major Hayden
 
LAW 531 MART Education Counseling--law531mart.com
LAW 531 MART Education Counseling--law531mart.comLAW 531 MART Education Counseling--law531mart.com
LAW 531 MART Education Counseling--law531mart.com
KeatonJennings88
 
How To Write A Thesis Statement In 5 Simple Steps
How To Write A Thesis Statement In 5 Simple StepsHow To Write A Thesis Statement In 5 Simple Steps
How To Write A Thesis Statement In 5 Simple Steps
Liz Harris
 
LAW 531 TUTOR Education Counseling--law531tutor.com
LAW 531 TUTOR Education Counseling--law531tutor.comLAW 531 TUTOR Education Counseling--law531tutor.com
LAW 531 TUTOR Education Counseling--law531tutor.com
KeatonJennings88
 
ISOL 535 CryptographyCompany OrganizationYour grou.docx
ISOL 535 CryptographyCompany  OrganizationYour grou.docxISOL 535 CryptographyCompany  OrganizationYour grou.docx
ISOL 535 CryptographyCompany OrganizationYour grou.docx
vrickens
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
InfinIT - Innovationsnetværket for it
 
TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015
sllongo3
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330Jim Kramer
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
ogglili
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Shawn Tuma
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
Morrison & Foerster
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
 
i need this paper written 2.docx
i need this paper written 2.docxi need this paper written 2.docx
i need this paper written 2.docx
write4
 

Similar to CCJS 321 PROJECT 1 (MD) (20)

Social media competence and ethics Oklahoma
Social media competence and ethics OklahomaSocial media competence and ethics Oklahoma
Social media competence and ethics Oklahoma
 
Entrepreneurship
EntrepreneurshipEntrepreneurship
Entrepreneurship
 
The 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for CybersecurityThe 1st Step to Zero Trust: Asset Management for Cybersecurity
The 1st Step to Zero Trust: Asset Management for Cybersecurity
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
LAW 531 MART Education Counseling--law531mart.com
LAW 531 MART Education Counseling--law531mart.comLAW 531 MART Education Counseling--law531mart.com
LAW 531 MART Education Counseling--law531mart.com
 
LabMD ALJ Decision
LabMD ALJ DecisionLabMD ALJ Decision
LabMD ALJ Decision
 
How To Write A Thesis Statement In 5 Simple Steps
How To Write A Thesis Statement In 5 Simple StepsHow To Write A Thesis Statement In 5 Simple Steps
How To Write A Thesis Statement In 5 Simple Steps
 
LAW 531 TUTOR Education Counseling--law531tutor.com
LAW 531 TUTOR Education Counseling--law531tutor.comLAW 531 TUTOR Education Counseling--law531tutor.com
LAW 531 TUTOR Education Counseling--law531tutor.com
 
ISOL 535 CryptographyCompany OrganizationYour grou.docx
ISOL 535 CryptographyCompany  OrganizationYour grou.docxISOL 535 CryptographyCompany  OrganizationYour grou.docx
ISOL 535 CryptographyCompany OrganizationYour grou.docx
 
02 presentation-christianprobst
02 presentation-christianprobst02 presentation-christianprobst
02 presentation-christianprobst
 
TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015TierPoint White Paper_With all due diligence_2015
TierPoint White Paper_With all due diligence_2015
 
With-All-Due-Diligence20150330
With-All-Due-Diligence20150330With-All-Due-Diligence20150330
With-All-Due-Diligence20150330
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
i need this paper written 2.docx
i need this paper written 2.docxi need this paper written 2.docx
i need this paper written 2.docx
 

More from JanuMorandy

CMIS 102 HOMEWORK 2
CMIS 102 HOMEWORK 2CMIS 102 HOMEWORK 2
CMIS 102 HOMEWORK 2
JanuMorandy
 
CMIS 102 HOMEWORK 3
CMIS 102 HOMEWORK 3CMIS 102 HOMEWORK 3
CMIS 102 HOMEWORK 3
JanuMorandy
 
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...
JanuMorandy
 
CMIS 102 FINAL PROJECT
CMIS 102 FINAL PROJECTCMIS 102 FINAL PROJECT
CMIS 102 FINAL PROJECT
JanuMorandy
 
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...
JanuMorandy
 
CHM 2045 EXAM 5
CHM 2045 EXAM 5CHM 2045 EXAM 5
CHM 2045 EXAM 5
JanuMorandy
 
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...
JanuMorandy
 
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...
JanuMorandy
 
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...
JanuMorandy
 
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
JanuMorandy
 
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEW
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEWCC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEW
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEW
JanuMorandy
 
CASH PROVIDED BY OPERATING ACTIVITIES:
CASH PROVIDED BY OPERATING ACTIVITIES:CASH PROVIDED BY OPERATING ACTIVITIES:
CASH PROVIDED BY OPERATING ACTIVITIES:
JanuMorandy
 
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...
JanuMorandy
 
BMGT 485 PAPER 3 FINAL PROJECT
BMGT 485 PAPER 3 FINAL PROJECTBMGT 485 PAPER 3 FINAL PROJECT
BMGT 485 PAPER 3 FINAL PROJECT
JanuMorandy
 
BMGT 496 FINAL PROJECT
BMGT 496 FINAL PROJECTBMGT 496 FINAL PROJECT
BMGT 496 FINAL PROJECT
JanuMorandy
 
BMGT 464 WEEK 1 ASSIGNMENT
BMGT 464 WEEK 1 ASSIGNMENTBMGT 464 WEEK 1 ASSIGNMENT
BMGT 464 WEEK 1 ASSIGNMENT
JanuMorandy
 
BMGT 485 ASSIGNMENT 2
BMGT 485 ASSIGNMENT 2BMGT 485 ASSIGNMENT 2
BMGT 485 ASSIGNMENT 2
JanuMorandy
 
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSISBMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
JanuMorandy
 
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSISBMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
JanuMorandy
 
BMGT 380 FINAL EXAM - 2016 VERSION
BMGT 380 FINAL EXAM - 2016 VERSIONBMGT 380 FINAL EXAM - 2016 VERSION
BMGT 380 FINAL EXAM - 2016 VERSION
JanuMorandy
 

More from JanuMorandy (20)

CMIS 102 HOMEWORK 2
CMIS 102 HOMEWORK 2CMIS 102 HOMEWORK 2
CMIS 102 HOMEWORK 2
 
CMIS 102 HOMEWORK 3
CMIS 102 HOMEWORK 3CMIS 102 HOMEWORK 3
CMIS 102 HOMEWORK 3
 
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...
CMIS 102 HANDS-ON LAB WEEK 6 OVERVIEW THIS HANDS-ON LAB ALLOWS YOU TO FOLLOW ...
 
CMIS 102 FINAL PROJECT
CMIS 102 FINAL PROJECTCMIS 102 FINAL PROJECT
CMIS 102 FINAL PROJECT
 
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...
CHAPTER 6 FROM ADVANCED BUSINESS LAW AND THE LEGAL ENVIRONMENT WAS ADAPTED BY...
 
CHM 2045 EXAM 5
CHM 2045 EXAM 5CHM 2045 EXAM 5
CHM 2045 EXAM 5
 
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...
CHAPTER 7 BUNYAN LUMBER, LLC INPUT AREA: TOTAL ACREAGE YEARS SINCE ORIGINAL P...
 
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...
CHAPTER 14 “STOCK INVESTMENTS” FROM ACCOUNTING PRINCIPLES: A BUSINESS PERSPEC...
 
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...
CENTENNIAL BREWERY PRODUCED REVENUES OF $1,145,227 IN 2008. IT HAS EXPENSES (...
 
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
CASE STUDY #4: TECHNOLOGY & PRODUCT REVIEW FOR AN SIEM REPLACEMENT CASE S...
 
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEW
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEWCC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEW
CC 322 FINAL PROJECT TWO: NONPROFIT ACCOUNTING GUIDELINES AND RUBRIC OVERVIEW
 
CASH PROVIDED BY OPERATING ACTIVITIES:
CASH PROVIDED BY OPERATING ACTIVITIES:CASH PROVIDED BY OPERATING ACTIVITIES:
CASH PROVIDED BY OPERATING ACTIVITIES:
 
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...
BUSINESS STAKEHOLDERS, INCLUDING SHAREHOLDERS, EMPLOYEES, CUSTOMERS, AND THE ...
 
BMGT 485 PAPER 3 FINAL PROJECT
BMGT 485 PAPER 3 FINAL PROJECTBMGT 485 PAPER 3 FINAL PROJECT
BMGT 485 PAPER 3 FINAL PROJECT
 
BMGT 496 FINAL PROJECT
BMGT 496 FINAL PROJECTBMGT 496 FINAL PROJECT
BMGT 496 FINAL PROJECT
 
BMGT 464 WEEK 1 ASSIGNMENT
BMGT 464 WEEK 1 ASSIGNMENTBMGT 464 WEEK 1 ASSIGNMENT
BMGT 464 WEEK 1 ASSIGNMENT
 
BMGT 485 ASSIGNMENT 2
BMGT 485 ASSIGNMENT 2BMGT 485 ASSIGNMENT 2
BMGT 485 ASSIGNMENT 2
 
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSISBMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
 
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSISBMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
BMGT 464 ASSIGNMENT 3 ORGANIZATIONAL LEVEL OF ANALYSIS
 
BMGT 380 FINAL EXAM - 2016 VERSION
BMGT 380 FINAL EXAM - 2016 VERSIONBMGT 380 FINAL EXAM - 2016 VERSION
BMGT 380 FINAL EXAM - 2016 VERSION
 

Recently uploaded

Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Lviv Startup Club
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 

Recently uploaded (20)

Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 

CCJS 321 PROJECT 1 (MD)

  • 1. Buy here: http://theperfecthomework.com/ccjs-321-project-1-md/ Project 1 Scenario Characters: You: Information Security Specialist, Greenwood Company Hubert Jenkins: Human Resources Director, Greenwood Company Mike McBride: (former) engineer, New Product’s Division, Greenwood Co. **Characters will carry through Project 1, 2 and the Final Project. However, please remain conscience of who you are/what roll you play in EACH project and in regards to specific questions. For the purposes of this project, imagine you are an Information Security (InfoSec) Specialist, an employee of the Greenwood Company, assigned to the company’s Incident Response Team. In this case, you have been notified by Mr. Hubert Jenkins, Human Resources Director for the Greenwood Company, that the company has just terminated Mr. Mike McBride, a former engineer in the company’s New Products Division, for cause (consistent tardiness and absences from work). Mr. Jenkins tells you that at Mr. McBride’s exit interview earlier that day, the terminated employee made several statements to the effect of “it is okay because I have a new job already and they were VERY happy to have me come from Greenwood, with ALL I have to offer.” McBride’s statements made Mr. Jenkins fear he might be taking Greenwood’s intellectual property with him to his new employer (undoubtedly a Greenwood competitor). In particular, Mr. Jenkins is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next three years. Mr. Jenkins provides you a copy of the source code to use in your investigation. Lastly, Mr. Jenkins tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in the future, so anything you do should be with thought about later potential admissibility in court.
  • 2. The 4​th​ Amendment to the U.S. Constitution reads, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” While the 4​th​ Amendment is most commonly interpreted to only affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal investigation is a possibility (and the Company has no desire to be named in a civil lawsuit) means you must consider its effect your actions. With the above scenario in mind, ​thoroughly​ answer the following questions (in paragraph format, properly citing outside research, where appropriate). 1. Prior to any incident happening, it is important for any company to implement a “forensic readiness” plan. Discuss the benefits of a forensic readiness plan and name what you believe are the top 3 requirements to establish forensic readiness within a private sector business. Support your answers. (Please note that while cyber security and digital forensics have overlaps in incident response preparation, please limit your answers here to forensic readiness in the digital forensic arena, not cyber security.) 2. Mr. Jenkins, out of concern for the theft/sharing of the “Product X” source code, is pushing requesting that you or your supervisor start searching the areas in which Mr. McBride had access within the building. Can (or Mr. McBrides’s supervisor) search McBrides’s assigned locker in the Company’s on-site gym for digital evidence? Support your answer. 3. Can (or Mr. McBrides’s supervisor) use a master key to search McBrides’s locked desk for digital evidence after McBride has left the premises? Support your answer. 4. The police have not been called or involved yet, however, Ms. Jenkins asks how involving the police will change your incident response. Develop a response to Mr. Jenkins that addresses how the parameters of search and seizure will change by involving the police in the investigation at this time. Support your answer. 5. There is a page in the Company’s “Employee Handbook” that states that anything brought onto the Company’s property, including the employees themselves, is subject to random search for items belonging to the Company. There is a space for the employee to acknowledge receipt of this notice. Mr. McBride has a copy of the handbook but never signed the page. Does that matter? Explain. 6. Greenwood Company uses a security checkpoint at the entrance to the building. A sign adjacent to the checkpoint states that the purpose of the checkpoint is for security staff to check for weapons or other materials that may be detrimental to the working environment or employee safety. Screening is casual and usually consists of verification of an employee’s Company ID card. Can security staff at
  • 3. this checkpoint be directed to open Mr. McBrides’s briefcase and seize any potential digital evidence? Support your answer. 7. You know that it is important to document the details of your investigation if the company wants to insure admissibility of any evidence collected in the future. However, Mr. Jenkins has never heard of the term “chain of custody.” Write an explanation to Mr. Jenkins of what the chain of custody is, why it is important, and what could occur if the chain of custody is not documented. Support your answer.