Computer Security Pape

I need a 8 page paper done on the assignment attached.

Final Term Paper:

Corporate Embezzlement

Value: 250 points

Imagine you are employed by a large city police department as the leader of the digital forensics division. A large corporation in the city has contacted the police for assistance in investigating its concerns that the company Chief Financial Officer (CFO) has been using company money to fund personal travel, gifts, and other expenses. As per the company security director, potential evidence collected thus far includes emails, bank statements, cancelled checks, a laptop, and a mobile device.

Write an eight to ten (8-10) page plan report in which you:

  1. Explain the processes you would use to seize, search, collect, store, and transport devices and other potential sources of evidence.
  2. Indicate the personnel resources needed for the investigation and assess why you believe this amount of resources is warranted.
  3. List the initial questions you would have for the security director regarding the company’s email environment and explain the tasks you would consider performing for this portion of the investigation.
  4. Create an outline of the steps you would take to ensure that if a trial were brought against the CFO, the evidence collected would be admissible in the court of law.
  5. Determine the potential evidence (including logs, devices, etc.) you would request from the company security director based on what she has identified and identify the other data sources you might consider reviewing.
  6. Explain the tools you would use for this investigation based on the potential evidence the company security director has already identified, as well as any other potential sources of evidence you might review.
  7. Describe the procedure and tool(s) you would consider utilizing for acquiring potential evidence from the CFO’s mobile device.
  8. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

NOTE:

  1. Use in-text citation to support your statements throughout the paper
  2. The paper will be review by SafeAssign to eliminate possible plagiarism within the paper. After you submit the paper, you can review the ‘similarity’ score that indicates how similar the paper is to other papers submitted on this topic at the college or online. If you find that the paper has a high similarity rating, you can revise and resubmit the paper prior to its due date.

 

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

Points: 200 Term Paper: Corporate Embezzlement
Criteria Unacceptable

Below 70% F

Fair

70-79% C

Proficient

80-89% B

Exemplary

90-100% A

1. Explain the processes you would use to seize, search, collect, store, and transport devices and other potential sources of evidence.

Weight: 10%

Did not submit or incompletely explained the processes you would use to seize, search, collect, store, and transport devices and other potential sources of evidence. Partially explained the processes you would use to seize, search, collect, store, and transport devices and other potential sources of evidence. Satisfactorily explained the processes you would use to seize, search, collect, store, and transport devices and other potential sources of evidence. Thoroughly explained the processes you would use to seize, search, collect, store, and transport devices and other potential sources of evidence.
2. Indicate the personnel resources needed for the investigation and assess why you believe this amount of resources is warranted.

Weight: 10%

Did not submit or incompletely indicated the personnel resources needed for the investigation; did not submit or incompletely assessed why you believe this amount of resources is warranted. Partially indicated the personnel resources needed for the investigation; partially assessed why you believe this amount of resources is warranted. Satisfactorily indicated the personnel resources needed for the investigation; satisfactorily assessed why you believe this amount of resources is warranted. Thoroughly indicated the personnel resources needed for the investigation; thoroughly assessed why you believe this amount of resources is warranted.
3. List the initial questions you would have for the security director regarding the company’s email environment and explain the tasks you would consider performing for this portion of the investigation.

Weight: 10%

Did not submit or incompletely listed the initial questions you would have for the security director regarding the company’s email environment; did not submit or incompletely explained the tasks you would consider performing for this portion of the investigation. Partially listed the initial questions you would have for the security director regarding the company’s email environment; partially explained the tasks you would consider performing for this portion of the investigation. Satisfactorily listed the initial questions you would have for the security director regarding the company’s email environment; satisfactorily explained the tasks you would consider performing for this portion of the investigation. Thoroughly listed the initial questions you would have for the security director regarding the company’s email environment; thoroughly explained the tasks you would consider performing for this portion of the investigation.
4. Create an outline of the steps you would take to ensure that if a trial were brought against the CFO, the evidence collected would be admissible in the court of law.

Weight: 20%

Did not submit or incompletely created an outline of the steps you would take to ensure that if a trial were brought against the CFO, the evidence collected would be admissible in the court of law. Partially created an outline of the steps you would take to ensure that if a trial were brought against the CFO, the evidence collected would be admissible in the court of law. Satisfactorily created an outline of the steps you would take to ensure that if a trial were brought against the CFO, the evidence collected would be admissible in the court of law. Thoroughly created an outline of the steps you would take to ensure that if a trial were brought against the CFO, the evidence collected would be admissible in the court of law.
5. Determine the potential evidence (including logs, devices, etc.) you would request from the company security director based on what she has identified and identify the other data sources you might consider reviewing.

Weight: 15%

Did not submit or incompletely determined the potential evidence (including logs, devices, etc.) you would request from the company security director based on what she has identified; did not submit or incompletely identified the other data sources you might consider reviewing. Partially determined the potential evidence (including logs, devices, etc.) you would request from the company security director based on what she has identified; partially identified the other data sources you might consider reviewing. Satisfactorily determined the potential evidence (including logs, devices, etc.) you would request from the company security director based on what she has identified; satisfactorily identified the other data sources you might consider reviewing. Thoroughly determined the potential evidence (including logs, devices, etc.) you would request from the company security director based on what she has identified; thoroughly identified the other data sources you might consider reviewing.
6. Explicate the tools you would use for this investigation based on the potential evidence the company security director has already identified, as well as any other potential sources of evidence you might review.

Weight: 10%

Did not submit or incompletely explicated the tools you would use for this investigation based on the potential evidence the company security director has already identified, as well as any other potential sources of evidence you might review. Partially explicated the tools you would use for this investigation based on the potential evidence the company security director has already identified, as well as any other potential sources of evidence you might review. Satisfactorily explicated the tools you would use for this investigation based on the potential evidence the company security director has already identified, as well as any other potential sources of evidence you might review. Thoroughly explicated the tools you would use for this investigation based on the potential evidence the company security director has already identified, as well as any other potential sources of evidence you might review.
7. Describe the procedure and tool(s) you would consider utilizing for acquiring potential evidence from the CFO’s mobile device.

Weight: 10%

Did not submit or incompletely described the procedure and tool(s) you would consider utilizing for acquiring potential evidence from the CFO’s mobile device.

 

Partially described the procedure and tool(s) you would consider utilizing for acquiring potential evidence from the CFO’s mobile device. Satisfactorily described the procedure and tool(s) you would consider utilizing for acquiring potential evidence from the CFO’s mobile device. Thoroughly described the procedure and tool(s) you would consider utilizing for acquiring potential evidence from the CFO’s mobile device.
8. 5 references

Weight: 5%

No references provided Does not meet the required number of references; some or all references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices.
9. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present

 

 

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
Hello. Can we help you?