SlideShare a Scribd company logo
Chief Executive Officer & Disgruntled Employee
Personnel within an organization re-organized his computer
workstation to match the organization chief executive officer
(CEO's) internet protocol (IP) address, and fully utilized CEO
IP address to send belligerent email messages, making messages
to appear as if the CEO is the author of offensive messages.
In the process, the organization information technology security
(ITS) team was notified and started monitoring all incoming and
outgoing network traffic in an attempt to catch the perpetrator
or the CEO, in action.
Without a shred of doubt, the CEO was the person of interest.
Tactlessly, word of the investigation leaked out within the
organization and the perpetrator withdraw from repeating
offensive messages.
Thank goodness, information gathered from a router early in the
investigation showed that the CEO's IP address is provisionally
associated with the Media Access Control (MAC) address of
another computer workstation within the organization.
The discovered MAC address used to locate the antisocial
computer workstation belongs to a one of the disgruntled active
employees who is a member of software development
department within the organization.
Persistent investigation reveals that the disgruntled employee’s
computer workstation is involved in this unlawful and criminal
operation.
Question-1
Absolutely, there was no external malefactor; then, which
component of the social engineering attack (SEA) is involved in
Chief Executive Officer & Disgruntled Employee operation?
Monitoring all incoming and outgoing network traffic to catch
the perpetrator was not a smooth sailing operation without
active involvement of information technology security (ITS)
team.
Question-2
Do you agree that the digital forensic investigator must seek
assistance from the organization ITS team to fully exonerate the
CEO?
Question-3
Do you the hopeful digital forensic investigators accept that
that digital forensic investigators must go through bi-annual
training on TCP/IP and the Open System Interconnection (OSI)
reference model to battle uncertainty in the crime scene?
If Yes, provide a comprehensive narrative to support your
assertion.

More Related Content

Similar to Chief Executive Officer & Disgruntled EmployeePersonnel within.docx

Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
Blue Cross Blue Shield of Michigan
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docx
SUBHI7
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
John Intindolo
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
PECB
 
53Pan has just been hired as the new cybersecurity manager .pdf
53Pan has just been hired as the new cybersecurity manager .pdf53Pan has just been hired as the new cybersecurity manager .pdf
53Pan has just been hired as the new cybersecurity manager .pdf
acecomputertcr
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Vishesh Singhal
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
ijtsrd
 
Reconnaissance and Social Engineering
Reconnaissance and Social EngineeringReconnaissance and Social Engineering
Reconnaissance and Social Engineering
Varunjeet Singh Rekhi
 
M017657678
M017657678M017657678
M017657678
IOSR Journals
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
iosrjce
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
ashish kumar
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
Asif Iqbal
 
Footprintig (Haching)
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)
Asif Iqbal
 
METHODS TO STOP DIFFERENT CYBER CRIMES .docx
METHODS TO STOP DIFFERENT CYBER CRIMES                            .docxMETHODS TO STOP DIFFERENT CYBER CRIMES                            .docx
METHODS TO STOP DIFFERENT CYBER CRIMES .docx
andreecapon
 
Social Engineering Attacks in IT World
Social Engineering Attacks in IT WorldSocial Engineering Attacks in IT World
Social Engineering Attacks in IT World
Akshay Mittal
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
Tiffany Sandoval
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 

Similar to Chief Executive Officer & Disgruntled EmployeePersonnel within.docx (18)

Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docx
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
53Pan has just been hired as the new cybersecurity manager .pdf
53Pan has just been hired as the new cybersecurity manager .pdf53Pan has just been hired as the new cybersecurity manager .pdf
53Pan has just been hired as the new cybersecurity manager .pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
 
Reconnaissance and Social Engineering
Reconnaissance and Social EngineeringReconnaissance and Social Engineering
Reconnaissance and Social Engineering
 
M017657678
M017657678M017657678
M017657678
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 
Footprintig (Haching)
Footprintig (Haching)Footprintig (Haching)
Footprintig (Haching)
 
METHODS TO STOP DIFFERENT CYBER CRIMES .docx
METHODS TO STOP DIFFERENT CYBER CRIMES                            .docxMETHODS TO STOP DIFFERENT CYBER CRIMES                            .docx
METHODS TO STOP DIFFERENT CYBER CRIMES .docx
 
Social Engineering Attacks in IT World
Social Engineering Attacks in IT WorldSocial Engineering Attacks in IT World
Social Engineering Attacks in IT World
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 

More from bissacr

Choose 1 focal point from each subcategory of practice, educatio.docx
Choose 1 focal point from each subcategory of practice, educatio.docxChoose 1 focal point from each subcategory of practice, educatio.docx
Choose 1 focal point from each subcategory of practice, educatio.docx
bissacr
 
CHOICE TOPIC Pick a philosophical topic of your own choosing and re.docx
CHOICE TOPIC Pick a philosophical topic of your own choosing and re.docxCHOICE TOPIC Pick a philosophical topic of your own choosing and re.docx
CHOICE TOPIC Pick a philosophical topic of your own choosing and re.docx
bissacr
 
Choice to documentcritique 10-12 Pages APA Formation .docx
Choice to documentcritique 10-12 Pages APA Formation .docxChoice to documentcritique 10-12 Pages APA Formation .docx
Choice to documentcritique 10-12 Pages APA Formation .docx
bissacr
 
Choice Hotels InternationalOverviewRead the case study, .docx
Choice Hotels InternationalOverviewRead the case study, .docxChoice Hotels InternationalOverviewRead the case study, .docx
Choice Hotels InternationalOverviewRead the case study, .docx
bissacr
 
Choice Theory- Is to choose to engage in delinquent and criminal beh.docx
Choice Theory- Is to choose to engage in delinquent and criminal beh.docxChoice Theory- Is to choose to engage in delinquent and criminal beh.docx
Choice Theory- Is to choose to engage in delinquent and criminal beh.docx
bissacr
 
CHM130LLLab 2Measurements Accuracy and PrecisionName __.docx
CHM130LLLab 2Measurements Accuracy and PrecisionName    __.docxCHM130LLLab 2Measurements Accuracy and PrecisionName    __.docx
CHM130LLLab 2Measurements Accuracy and PrecisionName __.docx
bissacr
 
Chocolates by Jacki has provided information relating to its curre.docx
Chocolates by Jacki has provided information relating to its curre.docxChocolates by Jacki has provided information relating to its curre.docx
Chocolates by Jacki has provided information relating to its curre.docx
bissacr
 
Chloe1a.  This study uses qualitative meta-synthesis to take a.docx
Chloe1a.  This study uses qualitative meta-synthesis to take a.docxChloe1a.  This study uses qualitative meta-synthesis to take a.docx
Chloe1a.  This study uses qualitative meta-synthesis to take a.docx
bissacr
 
Chinese railroad workers began to contribute to the Canadian railr.docx
Chinese railroad workers began to contribute to the Canadian railr.docxChinese railroad workers began to contribute to the Canadian railr.docx
Chinese railroad workers began to contribute to the Canadian railr.docx
bissacr
 
CHIROPRACTIC & MANUAL THERAPIESClar et al. Chiropractic & .docx
CHIROPRACTIC & MANUAL THERAPIESClar et al. Chiropractic & .docxCHIROPRACTIC & MANUAL THERAPIESClar et al. Chiropractic & .docx
CHIROPRACTIC & MANUAL THERAPIESClar et al. Chiropractic & .docx
bissacr
 
Chinese Society 中国社会What are the social voices in China.docx
Chinese Society 中国社会What are the social voices in China.docxChinese Society 中国社会What are the social voices in China.docx
Chinese Society 中国社会What are the social voices in China.docx
bissacr
 
China’s geography中国地理China’s physiographyRegion.docx
China’s geography中国地理China’s physiographyRegion.docxChina’s geography中国地理China’s physiographyRegion.docx
China’s geography中国地理China’s physiographyRegion.docx
bissacr
 
China’s  reliance on coal epitomizes the central single energy .docx
China’s  reliance on coal epitomizes the central single energy .docxChina’s  reliance on coal epitomizes the central single energy .docx
China’s  reliance on coal epitomizes the central single energy .docx
bissacr
 
chinese civilization essay question text 2-3 pages Cours.docx
chinese civilization essay question text 2-3 pages Cours.docxchinese civilization essay question text 2-3 pages Cours.docx
chinese civilization essay question text 2-3 pages Cours.docx
bissacr
 
ChinaThe Third RevolutionXi Jinping and the New Chinese Sta.docx
ChinaThe Third RevolutionXi Jinping and the New Chinese Sta.docxChinaThe Third RevolutionXi Jinping and the New Chinese Sta.docx
ChinaThe Third RevolutionXi Jinping and the New Chinese Sta.docx
bissacr
 
Chinas first emperor, Qin, unified the different territories and st.docx
Chinas first emperor, Qin, unified the different territories and st.docxChinas first emperor, Qin, unified the different territories and st.docx
Chinas first emperor, Qin, unified the different territories and st.docx
bissacr
 
Chinas Great Wall Please respond to the following, using sources.docx
Chinas Great Wall Please respond to the following, using sources.docxChinas Great Wall Please respond to the following, using sources.docx
Chinas Great Wall Please respond to the following, using sources.docx
bissacr
 
China1. Assess and include transcultural beliefs including l.docx
China1. Assess and include transcultural beliefs including l.docxChina1. Assess and include transcultural beliefs including l.docx
China1. Assess and include transcultural beliefs including l.docx
bissacr
 
China, also known as the Peoples Republic of China or PRC, is a cou.docx
China, also known as the Peoples Republic of China or PRC, is a cou.docxChina, also known as the Peoples Republic of China or PRC, is a cou.docx
China, also known as the Peoples Republic of China or PRC, is a cou.docx
bissacr
 
china & USA ----Food curlture1 follow news story, and related curr.docx
china & USA ----Food curlture1 follow news story, and related curr.docxchina & USA ----Food curlture1 follow news story, and related curr.docx
china & USA ----Food curlture1 follow news story, and related curr.docx
bissacr
 

More from bissacr (20)

Choose 1 focal point from each subcategory of practice, educatio.docx
Choose 1 focal point from each subcategory of practice, educatio.docxChoose 1 focal point from each subcategory of practice, educatio.docx
Choose 1 focal point from each subcategory of practice, educatio.docx
 
CHOICE TOPIC Pick a philosophical topic of your own choosing and re.docx
CHOICE TOPIC Pick a philosophical topic of your own choosing and re.docxCHOICE TOPIC Pick a philosophical topic of your own choosing and re.docx
CHOICE TOPIC Pick a philosophical topic of your own choosing and re.docx
 
Choice to documentcritique 10-12 Pages APA Formation .docx
Choice to documentcritique 10-12 Pages APA Formation .docxChoice to documentcritique 10-12 Pages APA Formation .docx
Choice to documentcritique 10-12 Pages APA Formation .docx
 
Choice Hotels InternationalOverviewRead the case study, .docx
Choice Hotels InternationalOverviewRead the case study, .docxChoice Hotels InternationalOverviewRead the case study, .docx
Choice Hotels InternationalOverviewRead the case study, .docx
 
Choice Theory- Is to choose to engage in delinquent and criminal beh.docx
Choice Theory- Is to choose to engage in delinquent and criminal beh.docxChoice Theory- Is to choose to engage in delinquent and criminal beh.docx
Choice Theory- Is to choose to engage in delinquent and criminal beh.docx
 
CHM130LLLab 2Measurements Accuracy and PrecisionName __.docx
CHM130LLLab 2Measurements Accuracy and PrecisionName    __.docxCHM130LLLab 2Measurements Accuracy and PrecisionName    __.docx
CHM130LLLab 2Measurements Accuracy and PrecisionName __.docx
 
Chocolates by Jacki has provided information relating to its curre.docx
Chocolates by Jacki has provided information relating to its curre.docxChocolates by Jacki has provided information relating to its curre.docx
Chocolates by Jacki has provided information relating to its curre.docx
 
Chloe1a.  This study uses qualitative meta-synthesis to take a.docx
Chloe1a.  This study uses qualitative meta-synthesis to take a.docxChloe1a.  This study uses qualitative meta-synthesis to take a.docx
Chloe1a.  This study uses qualitative meta-synthesis to take a.docx
 
Chinese railroad workers began to contribute to the Canadian railr.docx
Chinese railroad workers began to contribute to the Canadian railr.docxChinese railroad workers began to contribute to the Canadian railr.docx
Chinese railroad workers began to contribute to the Canadian railr.docx
 
CHIROPRACTIC & MANUAL THERAPIESClar et al. Chiropractic & .docx
CHIROPRACTIC & MANUAL THERAPIESClar et al. Chiropractic & .docxCHIROPRACTIC & MANUAL THERAPIESClar et al. Chiropractic & .docx
CHIROPRACTIC & MANUAL THERAPIESClar et al. Chiropractic & .docx
 
Chinese Society 中国社会What are the social voices in China.docx
Chinese Society 中国社会What are the social voices in China.docxChinese Society 中国社会What are the social voices in China.docx
Chinese Society 中国社会What are the social voices in China.docx
 
China’s geography中国地理China’s physiographyRegion.docx
China’s geography中国地理China’s physiographyRegion.docxChina’s geography中国地理China’s physiographyRegion.docx
China’s geography中国地理China’s physiographyRegion.docx
 
China’s  reliance on coal epitomizes the central single energy .docx
China’s  reliance on coal epitomizes the central single energy .docxChina’s  reliance on coal epitomizes the central single energy .docx
China’s  reliance on coal epitomizes the central single energy .docx
 
chinese civilization essay question text 2-3 pages Cours.docx
chinese civilization essay question text 2-3 pages Cours.docxchinese civilization essay question text 2-3 pages Cours.docx
chinese civilization essay question text 2-3 pages Cours.docx
 
ChinaThe Third RevolutionXi Jinping and the New Chinese Sta.docx
ChinaThe Third RevolutionXi Jinping and the New Chinese Sta.docxChinaThe Third RevolutionXi Jinping and the New Chinese Sta.docx
ChinaThe Third RevolutionXi Jinping and the New Chinese Sta.docx
 
Chinas first emperor, Qin, unified the different territories and st.docx
Chinas first emperor, Qin, unified the different territories and st.docxChinas first emperor, Qin, unified the different territories and st.docx
Chinas first emperor, Qin, unified the different territories and st.docx
 
Chinas Great Wall Please respond to the following, using sources.docx
Chinas Great Wall Please respond to the following, using sources.docxChinas Great Wall Please respond to the following, using sources.docx
Chinas Great Wall Please respond to the following, using sources.docx
 
China1. Assess and include transcultural beliefs including l.docx
China1. Assess and include transcultural beliefs including l.docxChina1. Assess and include transcultural beliefs including l.docx
China1. Assess and include transcultural beliefs including l.docx
 
China, also known as the Peoples Republic of China or PRC, is a cou.docx
China, also known as the Peoples Republic of China or PRC, is a cou.docxChina, also known as the Peoples Republic of China or PRC, is a cou.docx
China, also known as the Peoples Republic of China or PRC, is a cou.docx
 
china & USA ----Food curlture1 follow news story, and related curr.docx
china & USA ----Food curlture1 follow news story, and related curr.docxchina & USA ----Food curlture1 follow news story, and related curr.docx
china & USA ----Food curlture1 follow news story, and related curr.docx
 

Recently uploaded

ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 

Recently uploaded (20)

ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 

Chief Executive Officer & Disgruntled EmployeePersonnel within.docx

  • 1. Chief Executive Officer & Disgruntled Employee Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO's) internet protocol (IP) address, and fully utilized CEO IP address to send belligerent email messages, making messages to appear as if the CEO is the author of offensive messages. In the process, the organization information technology security (ITS) team was notified and started monitoring all incoming and outgoing network traffic in an attempt to catch the perpetrator or the CEO, in action. Without a shred of doubt, the CEO was the person of interest. Tactlessly, word of the investigation leaked out within the organization and the perpetrator withdraw from repeating offensive messages. Thank goodness, information gathered from a router early in the investigation showed that the CEO's IP address is provisionally associated with the Media Access Control (MAC) address of another computer workstation within the organization. The discovered MAC address used to locate the antisocial computer workstation belongs to a one of the disgruntled active employees who is a member of software development department within the organization. Persistent investigation reveals that the disgruntled employee’s computer workstation is involved in this unlawful and criminal operation. Question-1
  • 2. Absolutely, there was no external malefactor; then, which component of the social engineering attack (SEA) is involved in Chief Executive Officer & Disgruntled Employee operation? Monitoring all incoming and outgoing network traffic to catch the perpetrator was not a smooth sailing operation without active involvement of information technology security (ITS) team. Question-2 Do you agree that the digital forensic investigator must seek assistance from the organization ITS team to fully exonerate the CEO? Question-3 Do you the hopeful digital forensic investigators accept that that digital forensic investigators must go through bi-annual training on TCP/IP and the Open System Interconnection (OSI) reference model to battle uncertainty in the crime scene? If Yes, provide a comprehensive narrative to support your assertion.