Free Essay

Cis 417 Week 10 Term Paper

In: Business and Management

Submitted By activitymode
Words 784
Pages 4
CIS 417 WEEK 10 TERM PAPER
To purchase this visit here: http://www.activitymode.com/product/cis-417-week-10-term-paper/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 417 WEEK 10 TERM PAPER – INVESTIGATING DATA THEFT
Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion.
Write an eight to ten (8-10) page paper in which you:
1. Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab.
2. Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers.
3. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing.
4. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s).
More Details hidden…
Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 10 Term Paper – Investigating Data Theft in order to ace their studies.
CIS 417 WEEK 10 TERM PAPER
To purchase this visit here: http://www.activitymode.com/product/cis-417-week-10-term-paper/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 417 WEEK 10 TERM PAPER – INVESTIGATING DATA THEFT
Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion.
Write an eight to ten (8-10) page paper in which you:
1. Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab.
2. Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers.
3. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing.
4. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s).
More Details hidden…
Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 10 Term Paper – Investigating Data Theft in order to ace their studies.

CIS 417 WEEK 10 TERM PAPER
To purchase this visit here: http://www.activitymode.com/product/cis-417-week-10-term-paper/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 417 WEEK 10 TERM PAPER – INVESTIGATING DATA THEFT
Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion.
Write an eight to ten (8-10) page paper in which you:
1. Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab.
2. Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers.
3. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing.
4. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s).
More Details hidden…
Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 10 Term Paper – Investigating Data Theft in order to ace their studies.

Similar Documents

Premium Essay

Cis Term Paper

...Lufthansa locations worldwide, (2012) Blue Legends, one of the first ten so-called foursquare Connected Apps, is built around the location-based social network foursquare. (Blue Legends: New Lufthansa app connects frequent flyers; App enables virtual "check-ins" at Lufthansa locations worldwide, (2012) To clarify what foursquare is and how their service works with mobile apps; foursquare is a location-based social networking website for mobile devices, such as smartphones.Users"check in" at venues using a mobile website, text messaging or a device-specific application by selecting from a list of venues the application locates nearby. (TomTom Updates Its Navigation App for iPhone and iPad , 2012) In addition, foursquare claims an audience of 10 million users and 500,000 businesses worldwide that use its merchant platform. (Mulvihill, 2012) The Blue Legends app created by Lufthansa benefits the smartphone users because users can broadcast their current location via social networks by "checking in." A user who checks in frequently with foursquare becomes a "Mayor" instead of an "Expert Pilot." (Blue Legends: New Lufthansa app connects frequent flyers; App enables virtual "check-ins" at Lufthansa locationsworldwide, 2012) With the Blue Legends smartphone app, a user's position is determined either via radio location or GPS so the app can show nearby locations to check into (such as public buildings, places of interest or restaurants)." (Blue Legends: New Lufthansa app connects......

Words: 3229 - Pages: 13

Free Essay

Cis 106 Wk 10 Term Paper - the Future of It

...CIS 106 WK 10 Term Paper - The Future of IT To Purchase Click Link Below: http://strtutorials.com/CIS-106-WK-10-Term-Paper-The-Future-of-IT-CIS1062.htm CIS 106 WK 10 Term Paper - The Future of IT You are the new chief information officer for ACME Widgets. The president of the company recently asked you what you think the future of information technology will be. After a lengthy discussion, he further challenged you to write a position paper that will help direct the company’s allocation of resources based on your understanding of the future and potential paradigm shifts. Write a five to eight (5-8) page paper in which you: 1. Identify and describe a future information technology that you believe will create a paradigm shift. 2. Identify and describe the domain in which the shift will occur. 3. Explain the technology, how it works, and how it is different from what we have today. 4. Give at least five (5) reasons why the technology will create a shift. 5. Use at least three (3) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing......

Words: 279 - Pages: 2

Premium Essay

Cis 500 Term Paper

...Term Paper Keenan Rhines Strayer University Dr. Hammond Elbedour November 26th, 2014 People are moving into a new era of mobile computing, one that promises greater variety in applications, highly improved usability, and speedier networking. The 3G iPhone from Apple is the poster child for this trend, but there are plenty of other developments that point in this direction. In addition to this trend, many mobile applications were designed that perform specific tasks for the mobile user. * Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Nowadays, according to statistic, Ninety-seven percent of all smartphone users use mobile applications. Fifty-eight percent of those smart phone users use location-based applications. The results were raised from surveys done by a nonprofit global information security association called ISACA (previously known as the Information Systems Audit and Control Association). The location-based activities were implemented via applications installed on smartphone. These apps using the users current locations was calculated fifty-nine percent of the time but tagging photos on social media such as Twitter or Facebook was estimated forty-four percent. Besides, several mobile apps that capture geographical information, sim-card information and other personal information to share on social...

Words: 2148 - Pages: 9

Free Essay

Cis 106 Wk 10 Term Paper - the Future of It

...CIS 106 WK 10 Term Paper - The Future of IT To Purchase Click Link Below: http://strtutorials.com/CIS-106-WK-10-Term-Paper-The-Future-of-IT-CIS1062.htm CIS 106 WK 10 Term Paper - The Future of IT You are the new chief information officer for ACME Widgets. The president of the company recently asked you what you think the future of information technology will be. After a lengthy discussion, he further challenged you to write a position paper that will help direct the company’s allocation of resources based on your understanding of the future and potential paradigm shifts. Write a five to eight (5-8) page paper in which you: 1. Identify and describe a future information technology that you believe will create a paradigm shift. 2. Identify and describe the domain in which the shift will occur. 3. Explain the technology, how it works, and how it is different from what we have today. 4. Give at least five (5) reasons why the technology will create a shift. 5. Use at least three (3) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing......

Words: 279 - Pages: 2

Premium Essay

Cis 510 Week 10 Technical Paper

...A++PAPER;http://www.homeworkproviders.com/shop/cis-510-week-10-technical-paper/ CIS 510 WEEK 10 TECHNICAL PAPER CIS 510 Week 10 Technical Paper, CIS 510 Week 10 Technical Paper - Strayer Technical Paper: Final Project Plan Due Week 10 and worth 200 points Especially for You Jewelers is a small jewelry company in a college town. Over the last couple of years, it has experienced a tremendous increase in its business. However, its financial performance has not kept pace with its growth. The current system, which is partly manual and partly automated, doesn’t track accounts receivables sufficiently, and the company is finding it difficult to determine the reasons why the receivables are so high. The company runs frequent specials to attract customers but has no idea whether these efforts are profitable or if the benefit—if there is one—comes from associated sales. Especially for You Jewelers wants to increase repeat sales to its existing customers; thus, it needs to develop a customer database. It also wants to install a new direct sales and accounting system to help solve the outlined problems. The new direct sales and accounting system for Especially for You Jewelers will be an important element in the growth and success of the jewelry company. The direct sales portion must track every sale, be able to link to the inventory system for cost data, and provide a daily profit and loss report. The customer database must be able to produce purchase histories......

Words: 621 - Pages: 3

Premium Essay

Week 10 Term Paper Cis210 Strayer

...Term Paper System Analysis and Development Professor Blaine Easterwood Chris Donacki September 6th 2015 When beginning to build a web architecture there are several things that need to be kept in mind. Firstly, performance, this is one of the more important considerations, the speed of a website has a direct impact on both the effectiveness of the website and how satisfied the users will be with the website. Not only that, it does play a role in search engine ranking which directly correlates to possible revenue if applicable. Due to this creating an optimized site with low latency is very important. Reliability, any system, every system needs to be if nothing else reliable. I mean this in a sense that data will remain consistent. Scalability, when it comes to any system size is just another aspect that needs to always be considered. Given how fast some businesses can grow on today’s internet this aspect is especially important. Any future growth must be able to be accommodated. Manageability, having a system that can easily diagnose and manage any problems additionally effects any possible revenue, essentially the only time you won’t be able to make money off of a website is when it’s down. Having a system that is highly manageable has an effect on everything else. Finally, cost, this should more or less go without explaining. How much it will cost to build the architecture from the ground up, and how much one would have to make in return for it to be a profitable......

Words: 1489 - Pages: 6

Free Essay

Cis 333 Week 10 Technical Project Paper – New 2015

...CIS 333 Week 10 Technical Project Paper – New 2015 http://homeworkfy.com/downloads/cis-333-week-10-technical-project-paper-new-2015/ To Get this Tutorial Copy & Paste above URL Into Your Browser Hit Us Email for Any Inquiry at: Homeworkfy@gmail.com Visit our Site for More Tutorials: (http://homeworkfy.com/ ) Preview : After looking at your network security structure there are various physical threats that we will focus on that could have a Hugh impact on your business intellectual property and availability. For example threat like fire, hurricanes, tornadoes, flooding, lighting, earthquakes and electrical failure that can destroy the network vital information to be lost. In the case of any of these events, to protect the pharmacy from losing important patient data we need to secure this data by implementing a backup and recovery plan to help reduce the downtime to get back online and not loss customer loyalty. Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network. When looking at logical threats we must protect the network from unauthorized access internally and external attacks. Hackers understand that every device on the network has it weakness and they are trying to take advantage of it, devices that are most looked at are: servers, switches, routers, desktops, security devices and internal employees themselves....

Words: 462 - Pages: 2

Premium Essay

Cis 525 Week 10 Term Paper

...CIS 525 WEEK 10 TERM PAPER A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=cis-525-week-10-term-paper Visit Our website: http://hwsoloutions.com/ Product Description CIS 525 Week 10 Term Paper, Term Paper: Using Agile Project Management on Mobile Application Development Due Week 10 and worth 150 points Fictitious assumptions and details may be assumed or created for the completion of this assignment. Imagine you are the project manager for a critical project for an organization. The organization wants to implement an application on an iPad and Android Tablet such that the marketing executives and managers can get near real-time updates on how effective their marketing campaigns are doing. Since this project is so critical to the overall financial health of the company, you were asked to complete this project in three (3) months. Your business sponsors are very interested in your approach to manage this project and they are also demanding to see what the project team can deliver on a weekly basis. Due to the tight deadline, the project team was assembled quickly with ten (10) team members of various backgrounds. There are three (3) offshore developers in India and two (2) QA testers in San Francisco, CA. The rest of the project team and the product owner are in Herndon, VA. The team members were unfamiliar with each other. Additionally, there are ethical issues. For example, a developer has been consistently blaming an analyst for his accent......

Words: 653 - Pages: 3

Free Essay

Cis 417 Week 2 Assignment 1

...CIS 417 WEEK 2 ASSIGNMENT 1 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-2-assignment-1/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 2 ASSIGNMENT 1 – COMPUTER FORENSIC OVERVIEW Suppose you were recently hired for a new position as the computer forensics specialist at a mediumsized communications company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help achieve business goals based on security and confidentiality. You are also aware that the company has just had some issues with employee complaints of ongoing sexual harassment over email and instant messaging systems but has been unable to obtain adequate evidence of any kind. Write a two to three (2-3) page paper in which you: 1. Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist. 2. Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company’s data and information. 3. Discuss how computer forensics investigations pertain to the law and trying of cases. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 2 Assignment 1 – Computer Forensic Overview in order to ace their studies. CIS 417 WEEK 2 ASSIGNMENT 1 To purchase this visit......

Words: 679 - Pages: 3

Premium Essay

Cis 417 Week 4 Assignment 2 Forensic Lab Design

...CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN To purchase this visit here: http://www.activitymode.com/product/cis-417-week-4-assignment-2-forensic-lab-design/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization. Write a four to five (4-5) page paper in which you: 1. Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs. 2. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure. 3. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices. 4. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 4 Assignment 2 Forensic Lab Design in order to ace their studies. CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN To purchase this visit here: http://www.activitymode.com/product/cis-417-week-4-assignment-2-forensic-lab-design/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417......

Words: 640 - Pages: 3

Premium Essay

Cis 417 Week 5 Case Study 2

...CIS 417 WEEK 5 CASE STUDY 2 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-5-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: 1. Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered. 2. Indicate what explanation Sony officials gave for the length of time that had passed from the start of the attack to when the general public was made aware of the details. 3. Analyze and explain what you believe the correct forensic investigative action would have been once the attack was uncovered. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 WK 5 Case Study 2 – External Intrusion of the PlayStation Network in order to ace their studies. CIS 417 WEEK 5 CASE STUDY 2 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-5-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion......

Words: 580 - Pages: 3

Premium Essay

Cis 417 Week 7 Case Study 3 Casey Anthony Trial

...CIS 417 WEEK 7 CASE STUDY 3 CASEY ANTHONY TRIAL To purchase this visit here: http://www.activitymode.com/product/cis-417-week-7-case-study-3-casey-anthony-trial/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 7 CASE STUDY 3 – CASEY ANTHONY TRIAL On July 5, 2011, Casey Anthony was found not guilty of first-degree murder in the 2008 death of her daughter, Caylee. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: 1. Provide a brief summary of the background, charges, and trial of this high-profile court case. 2. Explain, from a forensics perspective, the digital evidence found on the Anthony family computer that helped the prosecutors build a case against Anthony. 3. Describe what the prosecution was unable to prove based on the digital evidence found. Indicate whether or not you think this is a common problem with digital evidence and provide a rationale for your response. 4. Explain the software issue that was found to have caused inaccurate evidence to be admitted into the trial. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 7 Case Study 3 Casey Anthony Trial in order to ace their studies. CIS 417 WEEK 7 CASE STUDY 3 CASEY ANTHONY TRIAL To purchase this visit here: http://www.activitymode.com/product/cis-417-week-7-case-study-3-casey-anthony-trial/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417......

Words: 655 - Pages: 3

Premium Essay

Cis 462 Wk 10 Term Paper Disaster Recovery Plan

...CIS 462 WK 10 TERM PAPER DISASTER RECOVERY PLAN To purchase this visit here: http://www.activitymode.com/product/cis-462-wk-10-term-paper-disaster-recovery-plan/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 462 WK 10 TERM PAPER DISASTER RECOVERY PLAN CIS 462 WK 10 Term Paper - Disaster Recovery Plan This assignment consists of two (2) parts: a written paper and a PowerPoint presentation. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment. In recent years, organizations have witnessed the impact of having effective and non-effective business continuity plans and disaster recovery plans. In today’s environment, with significant potential natural disasters, terrorist threats, and other man-made threats, it is critical that organizations develop effective business continuity plans and disaster recovery plans. Select an organization that you are familiar with, such as where you currently or previously have worked, contact a local organization, or search on the Internet for the needed detail of an organization you are interested in. Prepare a disaster recovery plan policy for that organization. Part 1: Written Paper 1. Write a six to eight (6-8) page paper in which you: a. Provide an overview of the organization that will be......

Words: 1069 - Pages: 5

Free Essay

Cis 534 Week 10 Term Paper

...CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit here: http://mindsblow.us/question_des/CIS534Week10TermPaper/2792 Contact us at: help@mindblows.us CIS 534 Week 10 Term Paper Network Design CIS 534 Week 10 Term Paper To purchase this visit......

Words: 600 - Pages: 3

Free Essay

Term Paper Cis 500

... Assignment: 1 Error Handling in an Activity Diagram LaShantel Wilson Strayer University Dr. Richard Brown April 18th 2016 Error handling are routines in a program that responds to errors (Encyclopedia). The measurement of quality in error handling is based on how the system informs the user of such conditions and what alternatives it provides for dealing with them (Encyclopedia). This paper will give a narrative which describes the changes and added error handling pathways in the diagram within this paper. There will be an overview of the errors, an explanation as of the main changes checking are imperative within the process, and overview of possible errors. A diagram will illustrate the updates of two (2) error handling pathways. Error Handling Pathway Ridgeline Mountain Outliners (RMO) is a large retail company that specialize in clothing and related accessories for all types of outdoor and sporting activities (BOOK). One approach to handling errors in received data is for the receiving system to send the data back to the sending system, often with an indication that an error has been detected by the receiving system (GOOGLE). When an enterprise IT system includes a sales system and a financial system, the sales system may send data to the financial system, which is only capable of accepting data that passes particular types of validity checks and other types of data consistency checks. When data received by the financial system does not pass the......

Words: 408 - Pages: 2