Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion.
Write an eight to ten (8-10) page paper in which you:
Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab.
Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers.
Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing.
Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s).
Identify the tools you would use to perform your investigation from beginning to end based on the information you have on the incident. Provide a brief overview of each tool, to include:
A description of the tool.
How you would use the tool in the investigation.
How the tool helps the investigation and the evidence you expect it to provide.
Why you believe the evidence the tool provides is critical to the investigation.
Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab?
I am hired to investigate a potential violation of corporate and data theft. Now I am here to arrest that person who is doing this thing and he continue sending confidential data of the aerospace to some other person. The various steps which I want to know from the head which are very beneficial for the uplift of the case:
Nobody knows who is that person and the head of engineering department hired me so nobody knows about me also so I take some steps in order to arrest that person:
Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers
Some places where I think we find some potential evidences are:
As the criminal perform some mistake so that he can catch by the police easily. So in order to catch the criminal the investigator has to start its enquiry from very deep so that no evidence is lost and every small evidence also help the investigator to catch the criminal.
Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing.
If I get some internet evidence then it becomes easy to trace the location of the criminal.
With the help of the IP address we can try to catch the criminals. This works like this as of the last 13 days we can read all the IP address and try to trace the location to which the criminal send the legal document and we arrest that person and from that we try to catch the criminal.
From that IP address we apply some tracing due to that tracing we get some clue.
Now the technology do much better so we have some of the software of anti-virus which tell us that a person who work on your computer take how much time, use which file, from that files used which type of information.
From this we come to know that how much time he take at which time this crime was done.
Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s).
As the transferred data is deleted from the suspect’s computer we adopt some steps:
Identify the tools you would use to perform your investigation from beginning to end based on the information you have on the incident. Provide a brief overview of each tool, to include:
The tool which I had to use in solving my case is:
So the tool which I use to arrest the criminal are:
Basically these two tools are used from beginning to end to catch the criminal.
Now to take the full advantage of the hidden cameras I said in front of every employee that I find the clue and from that clue I also come to know who the criminal is. I reveal it tomorrow morning. Now at the night the criminal try to finish all the clue and their details are captured in the hidden cameras.
Now the next evidence is the IP address which we taken from the sending e-mails. We get a lot of information from that also that the people who give the confidential information to them take money for this work from. When the investigator asked that what are you doing with this information then in order to reply there answer they said that they sell this information to the underworld don.
As both the tool provide a great help in solving the case. As we all know that the investigator tools are the best way to catch the criminal. If these tools are not available then from the small- small evidence are not sufficient for the solving of the case. It is same as at every step we need water to drink so at step of investigation we need a tool for proper investigation in a proper manner.
Yes the both the evidences help me a lot as the criminal whose pictures are in the hidden cameras and from IP address we also grab the same employee details. So from my point of view these tools are helpful in solving the case and are also proves critical to the investigation.
So in this way we catch the criminal.
Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a...
You have been hired to investigate possible fraud losses in Greenwor Manufacturing Company. Greenwor’s attorney contacted you in confidence and told you that she has had many tips indicating that Chad Wits, the CFO, is somehow stealing large sums of money from the company. Wits earns a good salary of $300,000 per year, but company employees report that he has recently purchased a $4 million house, a sail yacht worth at least $2 million, and one employee said that he...
Imagine that you are an administrator for a large hospital. Recently, your hospital has had shortages of staff in several areas. You have been asked to develop a job description and create an effective online job posting advertisement for a position of your choice. The most needed positions are RNs, LPNs, and direct patient care staff. Other needed positions are in the areas of operations, security, information technology, and nutritional services. You have been given the task of developing a...
As discussed in the video introduction, accounting fraud in large public companies has produced its fair share of major news headlines over the past 20 years. Even though laws like Sarbanes Oxley have been put in place to minimize the opportunity for financial fraud, the threat is still real in today’s corporate environment. Imagine you have been hired to oversee the financial audit of a major company in your city. During the audit, one of the company’s employees has disclosed...
Appendix B provides a scenario in which an employee has been dismissed. You have been assigned the roles of unionstewards, employer representatives, and arbitrators. You are expected to document what you will need to do in these roles as per questions below and what you have researched. You will state what your role will be and what you will say in thegrievance meetings as the employer and the union representatives. You will need to follow up with letters summarizing what possibly...
Read the situation below, and then answer the questions that follow in a Word document which you will submit as Assignment 4 in the dropbox. Your team is in an uproar – since COVID-19 people have been working in different capacities. Janus Tech’s offices were closed and some staff, like your janitorial team (15% of your staff), have not been working at all. Your sales team (45% of your staff) has moved to work online as have your consulting team...
Question 5 Suppose you have been hired as a consultant by Stevens Steel. Stevens Steel has prepared the following estimates for a long-term project it is considering. The initial investment is $35,510, and the project is expected to yield after-tax cash inflows of $5,000 per year for 10 years. The company has also supplied you with the following information: • There are 100 million shares outstanding, trading at $5 a share • The firm has debt outstanding of $300 million,...
You have been hired at an audit firm as a first year staff. This firm requires that all references to generally accepted accounting principles in the audit workpapers include the corresponding FASC citation (topic and subtopics). Below are three independent situations found at your clients that require research and documentation. For each question, (1) provide the citation number (topic and subtopic) that addresses the question and (2) answer the question. Document this under the question, indenting your answer or otherwise...
Margaret works in the Marketing Department for a large American multi family housing company. Recently she was told the company would be hiring to fill the Regional Marketin Director (RMD) position in the Central Region. The position has been vacant for a long time and Margaret has been performing the duties for both her job and the job of the RMD. However, the work has begun to be too demanding and you have been working overtime to complete both jobs....
suppose that you have been hired by the Florida state student health services department to design a case-control study to assess the following hypothesis among Florida state students at Florida State :Irregular sleep patterns increase the risk of headaches. Be sure that your design addresses the following elements: Refine the study hypothesis so that it is as specific as possible and contains all elements of a “good” hypothesis. How will you identify and define the cases? Are there any exclusion...
Suppose that you have been hired by the Florida state student health services department to design a case-control study to assess the following hypothesis among Florida state students at Florida State :Irregular sleep patterns increase the risk of headaches. Be sure that your design addresses the following elements: Refine the study hypothesis so that it is as specific as possible and contains all elements of a “good” hypothesis. How will you identify and define the cases? Are there any exclusion...