SlideShare a Scribd company logo
1 of 11
Corporate Embezzlement
Imagine you are employed by a large city police department as
the leader of the digital forensics division. A large corporation
in the city has contacted the police for assistance in
investigating its concerns that the company Chief Financial
Officer (CFO) has been using company money to fund personal
travel, gifts, and other expenses. As per the company security
director, potential evidence collected thus far includes emails,
bank statements, cancelled checks, a laptop, and a mobile
device.
Write an eight to ten (8-10) page plan report in which you:
1. Explain the processes you would use to seize, search, collect,
store, and transport devices and other potential sources of
evidence.
2. Indicate the personnel resources needed for the investigation
and assess why you believe this amount of resources is
warranted.
3. List the initial questions you would have for the security
director regarding the company’s email environment and
explain the tasks you would consider performing for this portion
of the investigation.
4. Create an outline of the steps you would take to ensure that if
a trial were brought against the CFO, the evidence collected
would be admissible in the court of law.
5. Determine the potential evidence (including logs, devices,
etc.) you would request from the company security director
based on what she has identified and identify the other data
sources you might consider reviewing.
6. Explicate the tools you would use for this investigation based
on the potential evidence the company security director has
already identified, as well as any other potential sources of
evidence you might review.
7. Describe the procedure and tool(s) you would consider
utilizing for acquiring potential evidence from the CFO’s
mobile device.
8. Use at least five (5) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA format.
The specific course learning outcomes associated with this
assignment are:
· Describe and analyze practices in obtaining digital evidence.
· Compare and contrast the various types of computer forensic
tools.
· Demonstrate the ability to develop procedural techniques in
crime and incident scenes.
· Describe processes in recovering graphic, mobile, and email
files.
· Develop a computer forensics plan that addresses and solves a
proposed business problem.
· Use technology and information resources to research
advanced issues in computer forensics.
· Write clearly and concisely about topics related to computer
forensics planning using proper writing mechanics and technical
style conventions.
Chapter 10: System Architecture
Note to Students: After you complete the Practice Tasks, click
here to view the sample
answers and check your work. Your answers might vary from
these examples and still be
correct. The intent is to give you a sample to guide you and
serve as a reference. When
you complete the Practice Tasks and review the sample answers,
please return to this
page and complete the Challenge Tasks.
Background
The IT team at Game Technology is working on an overall
architecture for the new C3 system.
They solicited RFPs from several hardware vendors, and
decided to work with Network
Illusions, a well-known local firm. Your job is to help analyze
the server test results, and to draw
network diagrams when requested.
The Network Illusions sales rep recommended a Model DX
server for the C3 network, and
submitted the following data, which shows projected network
response times for various
numbers of Game Technology users:
Practice Tasks
Task 1. Using the data provided, create an XY chart that shows
Response Time on the Y
(vertical) axis and Number of Users on the X (horizontal) axis.
You learned about XY
charts in Chapter 2 of your textbook. Describe the results and
your interpretation of the
data.
Task 2. Draw a bus network with a server, six workstations, a
printer, a scanner, and a wireless
access point (WAP). Also, determine how many separate data
paths are needed in a
mesh network with four nodes. Five nodes?
Challenge Tasks
After you complete the Practice Tasks, you learn about new
developments at Game Technology.
Although the spec was for a Model XP server, Network
Illusions delivered a newer model, called
the DX+. The vendor sales rep said that performance would be
the same or better, but the IT
team decided to run a series of response time tests. The results
are as follows:
Critical Thinking Challenge: Tasks Page
Projected Data:
Server Model DX Number of Users
10 20 30 40 50
Response Time (sec) .01 .015 .02 .025 .03
Task 1. Use the actual test data to create another XY chart,
similar to the first one. Describe the
results and your interpretation of the data.
Task 2. Draw the same network as a star topology with a central
switch. Also determine how
many separate data paths are needed in a mesh network that has
six nodes.
Projected Data:
Server Model DX + Number of Users
10 20 30 40 50
Response Time (sec) .01 .015 .02 .03 .05
Chapter 10: System Architecture
Note to Students: After you complete the Practice Tasks and
review the sample
answers, please click here to return to the Tasks page and
complete the Challenge Tasks.
Background
The IT team at Game Technology is working on an overall
architecture for the new C3 system.
They solicited RFPs from several hardware vendors, and
decided to work with Network
Illusions, a well-known local firm. Your job is to help analyze
the server test results, and to draw
network diagrams when requested.
The Network Illusions sales rep recommended a Model DX
server for the C3 network, and
submitted the following data, which shows projected network
response times for various
numbers of Game Technology users:
Sample Answers
Task 1. Using the data provided, create an XY chart that shows
Response Time on the Y
(vertical) axis and Number of Users on the X (horizontal) axis.
You learned about XY
charts in Chapter 2 of your textbook. Describe the results and
your interpretation of the
data.
Critical Thinking Challenge: Sample Answers Page
Projected Data:
Server Model DX Number of Users
10 20 30 40 50
Response Time (sec) .01 .015 .02 .025 .03
When the projected data on Server Model DX is plotted, it
reveals a linear relationship
where the response time closely correlates to the number of
users. As the number of
users grows, the response time increases proportionately. Given
this relationship, we
project that the server offers stable and predictable performance
across the range of
users specified.
Further analysis would be required to determine at what point,
if any, this model's
performance changes from a predictable linear relationship, to
something else. This
point is sometimes referred to as the “knee” in the curve. For
example, at a certain
point, the response time could begin to climb exponentially.
Task 2. Draw a bus network with a server, six workstations, a
printer, a scanner, and a wireless
access point (WAP). Also, determine how many separate data
paths are needed in a
mesh network with four nodes. Five nodes?
To determine the number of paths, you can just draw a sketch
and count the paths. This
works with relatively small numbers, but not so well if there are
dozens, or hundreds of
nodes. For example, in Figure 10-28 on page 428, there are five
nodes, including the
server, and a total of ten data paths.
If you are math-oriented, you can use a formula to determine
the number of data paths.
This formula is commonly used to analyze permutations and
combinations of values.
Here’s how it works: Assume that the number of nodes is
represented by “N.”
The formula for the number of data paths is:
N * (N-1)
2
Therefore, with four nodes, we have
4 * (4-1)
2
or
12/2 = 6
With five nodes, we have
5 * (5-1)
2
or
20/2 = 10
Corporate Embezzlement Imagine you are employed by a large c.docx

More Related Content

Similar to Corporate Embezzlement Imagine you are employed by a large c.docx

Cis 515 week 10 technical paper strayer
Cis 515 week 10 technical paper   strayerCis 515 week 10 technical paper   strayer
Cis 515 week 10 technical paper strayerlynnruffin
 
Cis 515 week 10 technical paper strayer
Cis 515 week 10 technical paper   strayerCis 515 week 10 technical paper   strayer
Cis 515 week 10 technical paper strayerAmyBell2017
 
Cis 515 week 10 technical paper strayer
Cis 515 week 10 technical paper   strayerCis 515 week 10 technical paper   strayer
Cis 515 week 10 technical paper strayertaynagant
 
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docxDISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docxelinoraudley582231
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguideYahye159
 
Strayer cis 408 week 10 technical paper
Strayer cis 408 week 10 technical paperStrayer cis 408 week 10 technical paper
Strayer cis 408 week 10 technical papershyaminfo40
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirementshapy
 
IT 200 Network DiagramBelow is the wired network configurat.docx
IT 200 Network DiagramBelow is the wired network configurat.docxIT 200 Network DiagramBelow is the wired network configurat.docx
IT 200 Network DiagramBelow is the wired network configurat.docxpriestmanmable
 
% Razones para alta disponibilidad
% Razones para alta disponibilidad% Razones para alta disponibilidad
% Razones para alta disponibilidadCPVEN
 
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid ComputingMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Computingbutest
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
 
Cis 408 Enthusiastic Study / snaptutorial.com
Cis 408 Enthusiastic Study / snaptutorial.comCis 408 Enthusiastic Study / snaptutorial.com
Cis 408 Enthusiastic Study / snaptutorial.comStephenson02
 
Cis 408 Technology levels--snaptutorial.com
Cis 408 Technology levels--snaptutorial.comCis 408 Technology levels--snaptutorial.com
Cis 408 Technology levels--snaptutorial.comsholingarjosh58
 
Cis 408 Success Begins / snaptutorial.com
Cis 408 Success Begins / snaptutorial.comCis 408 Success Begins / snaptutorial.com
Cis 408 Success Begins / snaptutorial.comRobinson072
 
IT 505 Final Submission Operating System Upgrade Implementation Brief
IT 505 Final Submission Operating System Upgrade Implementation BriefIT 505 Final Submission Operating System Upgrade Implementation Brief
IT 505 Final Submission Operating System Upgrade Implementation BriefEmmaDrinmk
 
BMIS 520IT Infrastructure Project Designing LAN Networks Assign
BMIS 520IT Infrastructure Project Designing LAN Networks AssignBMIS 520IT Infrastructure Project Designing LAN Networks Assign
BMIS 520IT Infrastructure Project Designing LAN Networks AssignJeniceStuckeyoo
 
You have been working as a technology associate the information .docx
You have been working as a technology associate the information .docxYou have been working as a technology associate the information .docx
You have been working as a technology associate the information .docxbriancrawford30935
 
Windows Server Deployment ProposalOverviewEach student will cr.docx
Windows Server Deployment ProposalOverviewEach student will cr.docxWindows Server Deployment ProposalOverviewEach student will cr.docx
Windows Server Deployment ProposalOverviewEach student will cr.docxfranknwest27899
 

Similar to Corporate Embezzlement Imagine you are employed by a large c.docx (20)

Cis 515 week 10 technical paper strayer
Cis 515 week 10 technical paper   strayerCis 515 week 10 technical paper   strayer
Cis 515 week 10 technical paper strayer
 
Cis 515 week 10 technical paper strayer
Cis 515 week 10 technical paper   strayerCis 515 week 10 technical paper   strayer
Cis 515 week 10 technical paper strayer
 
Cis 515 week 10 technical paper strayer
Cis 515 week 10 technical paper   strayerCis 515 week 10 technical paper   strayer
Cis 515 week 10 technical paper strayer
 
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docxDISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
DISCUSSION 1The Internet of Things (IoT) is based upon emerging .docx
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguide
 
Strayer cis 408 week 10 technical paper
Strayer cis 408 week 10 technical paperStrayer cis 408 week 10 technical paper
Strayer cis 408 week 10 technical paper
 
Week10 Analysing Client Requirements
Week10 Analysing Client RequirementsWeek10 Analysing Client Requirements
Week10 Analysing Client Requirements
 
IT 200 Network DiagramBelow is the wired network configurat.docx
IT 200 Network DiagramBelow is the wired network configurat.docxIT 200 Network DiagramBelow is the wired network configurat.docx
IT 200 Network DiagramBelow is the wired network configurat.docx
 
% Razones para alta disponibilidad
% Razones para alta disponibilidad% Razones para alta disponibilidad
% Razones para alta disponibilidad
 
Higher Homework
Higher HomeworkHigher Homework
Higher Homework
 
Processing
ProcessingProcessing
Processing
 
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid ComputingMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Computing
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Cis 408 Enthusiastic Study / snaptutorial.com
Cis 408 Enthusiastic Study / snaptutorial.comCis 408 Enthusiastic Study / snaptutorial.com
Cis 408 Enthusiastic Study / snaptutorial.com
 
Cis 408 Technology levels--snaptutorial.com
Cis 408 Technology levels--snaptutorial.comCis 408 Technology levels--snaptutorial.com
Cis 408 Technology levels--snaptutorial.com
 
Cis 408 Success Begins / snaptutorial.com
Cis 408 Success Begins / snaptutorial.comCis 408 Success Begins / snaptutorial.com
Cis 408 Success Begins / snaptutorial.com
 
IT 505 Final Submission Operating System Upgrade Implementation Brief
IT 505 Final Submission Operating System Upgrade Implementation BriefIT 505 Final Submission Operating System Upgrade Implementation Brief
IT 505 Final Submission Operating System Upgrade Implementation Brief
 
BMIS 520IT Infrastructure Project Designing LAN Networks Assign
BMIS 520IT Infrastructure Project Designing LAN Networks AssignBMIS 520IT Infrastructure Project Designing LAN Networks Assign
BMIS 520IT Infrastructure Project Designing LAN Networks Assign
 
You have been working as a technology associate the information .docx
You have been working as a technology associate the information .docxYou have been working as a technology associate the information .docx
You have been working as a technology associate the information .docx
 
Windows Server Deployment ProposalOverviewEach student will cr.docx
Windows Server Deployment ProposalOverviewEach student will cr.docxWindows Server Deployment ProposalOverviewEach student will cr.docx
Windows Server Deployment ProposalOverviewEach student will cr.docx
 

More from vanesaburnand

InstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxInstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxvanesaburnand
 
InstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxInstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxvanesaburnand
 
InstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxInstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxvanesaburnand
 
InstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxInstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxvanesaburnand
 
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxInstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxvanesaburnand
 
InstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxInstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxvanesaburnand
 
InstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxInstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxvanesaburnand
 
InstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxInstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxvanesaburnand
 
InstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxInstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxvanesaburnand
 
InstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxInstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxvanesaburnand
 
InstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxInstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxvanesaburnand
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxvanesaburnand
 
InstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxInstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxvanesaburnand
 
InstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxInstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxvanesaburnand
 
InstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxInstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxvanesaburnand
 
InstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxInstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxvanesaburnand
 
InstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxInstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxvanesaburnand
 
InstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxInstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxvanesaburnand
 
InstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxInstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxvanesaburnand
 
InstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxInstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxvanesaburnand
 

More from vanesaburnand (20)

InstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docxInstructionsYou are to create YOUR OWN example of each of t.docx
InstructionsYou are to create YOUR OWN example of each of t.docx
 
InstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docxInstructionsYou are a research group from BSocialMarketing, LLC.docx
InstructionsYou are a research group from BSocialMarketing, LLC.docx
 
InstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docxInstructionsYou are attending an international journalist event.docx
InstructionsYou are attending an international journalist event.docx
 
InstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docxInstructionsWrite the Organizational section of your project pap.docx
InstructionsWrite the Organizational section of your project pap.docx
 
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docxInstructionsWrite a two-page (double spaced, Times New Roman S.docx
InstructionsWrite a two-page (double spaced, Times New Roman S.docx
 
InstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docxInstructionsWrite a thesis statement in response to the topi.docx
InstructionsWrite a thesis statement in response to the topi.docx
 
InstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docxInstructionsWhat You will choose a current issue of social.docx
InstructionsWhat You will choose a current issue of social.docx
 
InstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docxInstructionsWrite a paper about the International Monetary Syste.docx
InstructionsWrite a paper about the International Monetary Syste.docx
 
InstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docxInstructionsWrite a comprehensive medical report on a disease we.docx
InstructionsWrite a comprehensive medical report on a disease we.docx
 
InstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docxInstructionsWhether you believe” in evolution or not, why is it.docx
InstructionsWhether you believe” in evolution or not, why is it.docx
 
InstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docxInstructionsWe have been looking at different psychological .docx
InstructionsWe have been looking at different psychological .docx
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
 
InstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docxInstructionsThis written assignment requires the student to inve.docx
InstructionsThis written assignment requires the student to inve.docx
 
InstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docxInstructionsThe Art Form Most Meaningful to MePick the form .docx
InstructionsThe Art Form Most Meaningful to MePick the form .docx
 
InstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docxInstructionsThink of a specific topic and two specific kin.docx
InstructionsThink of a specific topic and two specific kin.docx
 
InstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docxInstructionsThere are different approaches to gathering risk da.docx
InstructionsThere are different approaches to gathering risk da.docx
 
InstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docxInstructionsThe  Public Archaeology Presentation invites you.docx
InstructionsThe  Public Archaeology Presentation invites you.docx
 
InstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docxInstructionsThe tools of formal analysis are the starting point .docx
InstructionsThe tools of formal analysis are the starting point .docx
 
InstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docxInstructionsThe Homeland Security (DHS) agency is intended t.docx
InstructionsThe Homeland Security (DHS) agency is intended t.docx
 
InstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docxInstructionsThe student should describe how learning abou.docx
InstructionsThe student should describe how learning abou.docx
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 

Corporate Embezzlement Imagine you are employed by a large c.docx

  • 1. Corporate Embezzlement Imagine you are employed by a large city police department as the leader of the digital forensics division. A large corporation in the city has contacted the police for assistance in investigating its concerns that the company Chief Financial Officer (CFO) has been using company money to fund personal travel, gifts, and other expenses. As per the company security director, potential evidence collected thus far includes emails, bank statements, cancelled checks, a laptop, and a mobile device. Write an eight to ten (8-10) page plan report in which you: 1. Explain the processes you would use to seize, search, collect, store, and transport devices and other potential sources of evidence. 2. Indicate the personnel resources needed for the investigation and assess why you believe this amount of resources is warranted. 3. List the initial questions you would have for the security director regarding the company’s email environment and explain the tasks you would consider performing for this portion of the investigation. 4. Create an outline of the steps you would take to ensure that if a trial were brought against the CFO, the evidence collected would be admissible in the court of law. 5. Determine the potential evidence (including logs, devices, etc.) you would request from the company security director based on what she has identified and identify the other data sources you might consider reviewing. 6. Explicate the tools you would use for this investigation based
  • 2. on the potential evidence the company security director has already identified, as well as any other potential sources of evidence you might review. 7. Describe the procedure and tool(s) you would consider utilizing for acquiring potential evidence from the CFO’s mobile device. 8. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format. The specific course learning outcomes associated with this assignment are: · Describe and analyze practices in obtaining digital evidence. · Compare and contrast the various types of computer forensic tools. · Demonstrate the ability to develop procedural techniques in crime and incident scenes. · Describe processes in recovering graphic, mobile, and email files. · Develop a computer forensics plan that addresses and solves a proposed business problem. · Use technology and information resources to research advanced issues in computer forensics. · Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.
  • 3. Chapter 10: System Architecture Note to Students: After you complete the Practice Tasks, click here to view the sample answers and check your work. Your answers might vary from these examples and still be correct. The intent is to give you a sample to guide you and serve as a reference. When you complete the Practice Tasks and review the sample answers, please return to this page and complete the Challenge Tasks. Background The IT team at Game Technology is working on an overall architecture for the new C3 system. They solicited RFPs from several hardware vendors, and decided to work with Network Illusions, a well-known local firm. Your job is to help analyze the server test results, and to draw network diagrams when requested. The Network Illusions sales rep recommended a Model DX server for the C3 network, and submitted the following data, which shows projected network response times for various
  • 4. numbers of Game Technology users: Practice Tasks Task 1. Using the data provided, create an XY chart that shows Response Time on the Y (vertical) axis and Number of Users on the X (horizontal) axis. You learned about XY charts in Chapter 2 of your textbook. Describe the results and your interpretation of the data. Task 2. Draw a bus network with a server, six workstations, a printer, a scanner, and a wireless access point (WAP). Also, determine how many separate data paths are needed in a mesh network with four nodes. Five nodes? Challenge Tasks After you complete the Practice Tasks, you learn about new developments at Game Technology. Although the spec was for a Model XP server, Network Illusions delivered a newer model, called the DX+. The vendor sales rep said that performance would be the same or better, but the IT team decided to run a series of response time tests. The results are as follows:
  • 5. Critical Thinking Challenge: Tasks Page Projected Data: Server Model DX Number of Users 10 20 30 40 50 Response Time (sec) .01 .015 .02 .025 .03 Task 1. Use the actual test data to create another XY chart, similar to the first one. Describe the results and your interpretation of the data. Task 2. Draw the same network as a star topology with a central switch. Also determine how many separate data paths are needed in a mesh network that has six nodes.
  • 6. Projected Data: Server Model DX + Number of Users 10 20 30 40 50 Response Time (sec) .01 .015 .02 .03 .05 Chapter 10: System Architecture Note to Students: After you complete the Practice Tasks and review the sample answers, please click here to return to the Tasks page and complete the Challenge Tasks. Background The IT team at Game Technology is working on an overall architecture for the new C3 system. They solicited RFPs from several hardware vendors, and decided to work with Network Illusions, a well-known local firm. Your job is to help analyze the server test results, and to draw
  • 7. network diagrams when requested. The Network Illusions sales rep recommended a Model DX server for the C3 network, and submitted the following data, which shows projected network response times for various numbers of Game Technology users: Sample Answers Task 1. Using the data provided, create an XY chart that shows Response Time on the Y (vertical) axis and Number of Users on the X (horizontal) axis. You learned about XY charts in Chapter 2 of your textbook. Describe the results and your interpretation of the data. Critical Thinking Challenge: Sample Answers Page
  • 8. Projected Data: Server Model DX Number of Users 10 20 30 40 50 Response Time (sec) .01 .015 .02 .025 .03 When the projected data on Server Model DX is plotted, it reveals a linear relationship where the response time closely correlates to the number of users. As the number of users grows, the response time increases proportionately. Given this relationship, we project that the server offers stable and predictable performance across the range of users specified. Further analysis would be required to determine at what point, if any, this model's performance changes from a predictable linear relationship, to something else. This point is sometimes referred to as the “knee” in the curve. For example, at a certain
  • 9. point, the response time could begin to climb exponentially. Task 2. Draw a bus network with a server, six workstations, a printer, a scanner, and a wireless access point (WAP). Also, determine how many separate data paths are needed in a mesh network with four nodes. Five nodes? To determine the number of paths, you can just draw a sketch and count the paths. This works with relatively small numbers, but not so well if there are dozens, or hundreds of nodes. For example, in Figure 10-28 on page 428, there are five nodes, including the server, and a total of ten data paths. If you are math-oriented, you can use a formula to determine the number of data paths. This formula is commonly used to analyze permutations and combinations of values. Here’s how it works: Assume that the number of nodes is
  • 10. represented by “N.” The formula for the number of data paths is: N * (N-1) 2 Therefore, with four nodes, we have 4 * (4-1) 2 or 12/2 = 6 With five nodes, we have 5 * (5-1) 2 or 20/2 = 10