Details of this Paper

DEVRY CCSI360 WEEK 3 YOUDECIDE

Description

solution..


Question

Print

 

Scenario

 

 

Scenario Summary

 

It has been 2 weeks since you conducted your first forensics investigation at Systematix. You feel more confident in your abilities and how you conducted yourself during the investigation. Even though you are a new employee, you are beginning to feel comfortable in your new role. Your manager seems pleased with your performance and openly commended you during last week’s staff meeting.

 

This morning, your manager calls you into her office and states she received a report from a manager in the contracts group who believes his supervisor (departmental director) provided confidential contract information to a competitor in hopes of being offered a high-level position with the competing company. The Contracts Manager has no concrete evidence of such theft but wants someone to investigate the possible unethical activity.

 

You set up initial meetings with key personnel in order to gather more information.

 

Your Assignment

 

As a Forensics Support Analyst, you coordinate to meet with key personnel in order to gather more information. After your meetings are complete, you will summarize your findings by creating a written report.

 

 

KEY PLAYERS

 

 

Back to Top

 

Title/Role/Character

 

Name

 

Title

 

Race and gender

 

 

Script: Text and Audio

 

 

The character’s position, viewpoint, opposing view, and so forth is below. This text also will serve as the audio.

 

Martha Massey, Security and Compliance Manager, Black Female

 

Internal Staff Meeting, Monday, 11 a.m.

 

 

“This is a serious issue. We take this inquiry solemnly and must do our due diligence and investigate this matter as soon as possible. At this point, the director’s subordinate manager is not 100% certain that company policy has been violated but wants us to perform a preliminary investigation. If you observe any red flags at all, let me know first before you share any information with anyone outside of our group. Let’s keep this internal right now. I want to review your findings. Remember, anything that is released from our department must be reviewed, approved, and if need be, edited by me. On a side note, when do you plan to obtain your Encase Certification?”

 

 

Arvind Patel, Manager, Indian Male

 

Office Visit, Wednesday, 1 p.m.

 

 

“I’ve been hesitant about reporting this, but my director, Steve Harman, may be providing private confidential information to one of our competitors. Steve used to be a very productive and energetic boss, but during that past 6 months, he’s been behaving strangely. I have been told by anonymous sources that he spends a lot of his time searching online job boards. I’ve also been told that he said he could, “Make a lot of money by doing consultant work for one of our primary competitors.” I just have the feeling that he may be communicating inappropriately with our competition. I think it would be a good idea to monitor his activity. He is my supervisor, so I wish to remain anonymous. I’ve never thought of myself as a whistle-blower but maybe I am. By the way, did I tell you his brother-in-law is a software developer in Nigeria?

 

 

Bart Oliver, Company Privacy Officer, White Male

 

Office Visit, Thursday, 10:20 a.m.

 

 

“Hello, I’m so glad to meet you. I understand you are new to our team! Let’s discuss the matter at hand. I’m sure you know my role here at the company so I won’t explain it to you, but please understand that security and privacy work hand-in-hand here. I want you to do what is needed to complete your investigation but also to keep in mind the employee’s right to privacy. After all, this isn’t the federal government, but I want to ensure that our network and information systems are adequately protected.”

 

 

Marrisa Rodriguez, Network Security Manager, Hispanic Female

 

 

Conference Call, Thursday, 2 p.m.

 

 

“I understand that you will need to conduct an investigation on one of our employees. If that is the case, I would be glad to assist you. We work very closely with the Security and Compliance Department and want to support you however we can. I trust no one in the organization, so it is important to protect myself from both superiors and subordinates. I’ve read about the Patriot Act, so I’m sure we can do pretty much whatever we want. These are business systems, and he should not have any expectation of privacy. I recommend that we begin collecting

 

 

* all e-mail traffic from his work e-mail account and private e-mail account;

 

* all websites visited;

 

* numbers from sent and received phone calls; and

 

* all voicemail from his personal cell phone.”

 

 

 

 

YOU DECIDE

 

 

Activity or Assignment

 

Assignment

 

Read the You Decide scenario and using the information provided, prepare a two- to three-page report (at least 300 words per page), not including the Title Page, Abstract, or References pages, using the APA format (see the APA template in Doc Sharing). Recalling the information collected during the interviews and information from the text, your report should address the following areas.

 

 

The role of the Corporate Privacy Officer and Information Security Officer during whistle-blowing events and measures used to protect Whistle Blowers from retaliation

 

Relationships between IT workers , UT users, and employers

 

Malicious insiders and cyber-criminals

 

Technology certifications and their value

 

Inappropriate use of computing systems

 

Note: It is recommended to create six sections within your paper to discuss each of the bullet items.

 

 

Submit your assignment to the Dropbox located on the silver tab at the top of the page.

 

 

Category Points Description

 

Understanding 35

 

Demonstrate a strong grasp of the problem at hand

 

Demonstrate understanding of how the course concepts apply to the problem

 

Analysis 35

 

Apply original thought to solving the business problem

 

Apply concepts from the course material correctly toward solving the business problem

 

Execution 10

 

Communicate answers clearly and succinctly using strong organization and proper grammar

 

Adhere to the APA format (title page, abstract, page header, reference page, etc.)

 

Total 80 A quality paper will meet or exceed all of the above requirements.

 

Note!

 

Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox ,

 

Paper#36447 | Written in 27-Jan-2016

Price : $20
SiteLock