Information Technology Security
Chief Executive Officer & Disgruntled Employee Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO’s) internet protocol (IP) address, and fully utilized CEO IP address to send belligerent email messages, making messages to appear as if the CEO is the author of offensive messages. In the process, the organization information technology security (ITS) team was notified and started monitoring all incoming and outgoing network traffic in an attempt to catch the perpetrator or the CEO, in action. Without a shred of doubt, the CEO was the person of interest. Tactlessly, word of the investigation leaked out within the organization and the perpetrator withdraw from repeating offensive messages. Thank goodness, information gathered from a router early in the investigation showed that the CEO’s IP address is provisionally associated with the Media Access Control (MAC) address of another computer workstation within the organization. The discovered MAC address used to locate the antisocial computer workstation belongs to one of the disgruntled active employees who is a member of the software development department within the organization. Persistent investigation reveals that the disgruntled employee’s computer workstation is involved in this unlawful and criminal operation. Question-1 Absolutely, there was no external malefactor; then, which component of the social engineering attack (SEA) is involved in Chief Executive Officer & Disgruntled Employee operation? Monitoring all incoming and outgoing network traffic to catch the perpetrator was not a smooth sailing operation without active involvement of the information technology security (ITS) team. Question-2 Do you agree that the digital forensic investigator must seek assistance from the organization’s ITS team to fully exonerate the CEO? Question-3 Do you the hopeful digital forensic investigators accept that that digital forensic investigators must go through bi-annual training on TCP/IP and the Open System Interconnection (OSI) reference model to battle uncertainty in the crime scene? If Yes, provide a comprehensive narrative to support your assertion. For more information on Information Technology Security read this: https://en.wikipedia.org/wiki/Computer_security
Top-quality papers guaranteed
100% original papers
We sell only unique pieces of writing completed according to your demands.
Confidential service
We use security encryption to keep your personal data protected.
Money-back guarantee
We can give your money back if something goes wrong with your order.
Enjoy the free features we offer to everyone
-
Title page
Get a free title page formatted according to the specifics of your particular style.
-
Custom formatting
Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.
-
Bibliography page
Don’t pay extra for a list of references that perfectly fits your academic needs.
-
24/7 support assistance
Ask us a question anytime you need to—we don’t charge extra for supporting you!
Calculate how much your essay costs
What we are popular for
- English 101
- History
- Business Studies
- Management
- Literature
- Composition
- Psychology
- Philosophy
- Marketing
- Economics