The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 283 Weeks Ago |
| Questions Answered: | 27237 |
| Tutorials Posted: | 27372 |
MCS,MBA(IT), Pursuing PHD
Devry University
Sep-2004 - Aug-2010
Assistant Financial Analyst
NatSteel Holdings Pte Ltd
Aug-2007 - Jul-2017
C_O_M_P_F_O_R_EN_SIC assignmentÂ
Check the attached docs
Â
e_v_i_d_e_n_c_e_c_u_s_t_o_d_y_f_o_rm.docxÂ
Â
Â
Derrick:Â Hello, it's me, Derrick. So nice to see you again! I've got another challenging case for us to work on today. Part of my job is to provide investigative services for the RBC Corporation. I work there part-time as a Senior Forensic Analyst. Their Human Resources manager contacted me about a case that requires my expertise. Come along and assist me! Today, we need to collect digital evidence to help Human Resources build an early termination case against one of their employees. Let's get started
Derrick:Â This is Adam. He's been accused of violating RBC's fair use computer policy. Recently, Human Resources has discovered that Adam sent multiple inappropriate and harassing images via e-mail to one of his female coworkers from his work computer. If this is true, he has violated the company's fair use policy and could be terminated.
Derrick:Â Our first step is to talk with Tina, the HR manager to get some more information about this case. So Tina, what exactly do you need us to do?
Tina:Â Well, we need you to conduct an investigation to help us identify whether or not Adam is guilty of violating the company's fair use policy. However, we need solid evidence to back up our claim. It is alleged that Adam has been sending inappropriate images to one of this female coworkers. However, Adam denies these claims. This investigation is part of our early termination case against Adam. If we can prove he did violate this policy, we will terminate his employment with RBC.
Derrick:Â I see. Yes, we will get to work right away.
Derrick:Â Now that we are in the RBC office area, we can get access to many of the evidence pieces we need. So, you may be asking, in what areas should we look for evidence? First, we want to seize the computer of the suspect and the victim. We need to take a look to see what has been transpiring. Secondly, it is important to get access to the e-mail server and network share. All of the communications between Adam and the victim are housed on the e-mail server. Plus, Adam may have saved those inappropriate images to his network share drive. In addition to looking at the current e-mail server and network share, we must take archives of the network share and e-mail server and put them into evidence. Also, the physical access control system log and the user account log are both important as they establish who has had access rights. Finally, it is important to interview other RBC employees who may know about the situation. Interviewing some of Adam's close co-workers as well as the victim's co-workers can shed light on Adam's behavior such as does he share his computer password with others.
Derrick:Â Now that we have reviewed the areas of evidence we are looking for, it is your job to tell me exactly what evidence you can gather from areas identified in this case. Click on the form to continue to your assignment. Be sure to ask your instructor any questions that arise. See you next time!
Â
Â
Â
Â
Attachments:
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll