Instructions
Project #1 – Understanding Investigative Parameters
- No directly quoted material may be used in this project paper.
- Resources should be summarized or paraphrased with appropriate in-text and Resource page citations.
Scenario Characters:
You: Information Security Analyst, Provincial Worldwide
Ms. Carol McPherson: Information Security Director, Provincial Worldwide (Your supervisor)
Mr. Harold Newman: Human Resources Director, Provincial Worldwide
Mr. John Belcamp: (former) engineer, Product Development Division, Provincial Worldwide
Ms. Evelyn Bass: Product Engineering Manager; Product Development Division, Provincial Worldwide (John Belcamp’s Supervisor)
**Characters will carry through Project 1, 2 and the Final Project. However, please remain conscious of who you are/what roll you play in EACH project and in regards to specific questions.
For the purposes of this project, imagine you are a Corporate Security Analyst, an employee of Provincial Worldwide and assigned to the company’s Corporate Protection Team.
In this case, you have been notified by Mr. Newman, Human Resources Director for Provincial Worldwide, that the company has just terminated Mr. John Belcamp, a former engineer in the company’s New Products Division, for cause (consistent tardiness and absences from work). Mr. Newman tells you that during Mr. Belcamp’s exit interview earlier that day, the terminated employee made several strange statements that seem to elude to a current program the company is working on.
Mr. Belcamp’s statements made Mr. Newman fear he might be taking Provincial’s intellectual property with him to his new employer (undoubtedly a competitor). In particular, Mr. Newman is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next several years. Mr. Newman provides you a copy of the source code to use in your investigation. Lastly, Mr. Newman tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in the future, so anything you do should be with thought about later potential admissibility in court. He tells you that in a conversation with other Corporate executives that their understanding of the investigative technological issues and how they have anything to do with a person’s right as an employee seem a bit lacking; so you will need to be detailed in any explanation.
The Fourth Amendment to the U.S. Constitution reads, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” While the Fourth Amendment is most commonly interpreted to only affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal investigation is a possibility (and the Company has no desire to be named in a civil lawsuit) means you must consider its effect to your actions.
With the above scenario in mind, thoroughly answer the following questions (in paragraph format, properly referring to and citing materials used in this course as well as outside research, where appropriate, and within a reference page at the end of the project paper).
1. Prior to any incident happening, it is important for any company to implement a “forensic readiness” plan. Discuss the benefits of a forensic readiness plan and name what you believe are the top two (2) requirements to establish forensic readiness within a private sector business like Provincial Worldwide. Support your answers. (Please note that while cyber security and digital forensics have overlaps in incident response preparation, please limit your answers here to forensic readiness in the digital forensic arena, not cyber security.)
2. Ms. McPherson, out of concern for the theft/sharing of the “Product X” source code, and after discussing the issue with one of the Corporate attorneys is requesting that you and Ms. Bass start searching the areas in which Mr. Belcamp had access within the building. Can you or Ms. Bass search Mr. Belcamp’s assigned locker in the Company’s on-site gym for digital evidence, and why? Additionally, can you or Ms. Bass use a master key to search Mr. Belcamp’s locked desk for digital evidence, whether still on site, or after Mr. Belcamp has left the premises? Support your answer.
3. A check with security confirms that John Belcamp passed through the security checkpoint when coming in to work in his vehicle. A sign at the checkpoint states that the purpose of the checkpoint is for security staff to check for weapons or other materials that may be detrimental to the working environment and employee safety. Screening is sometimes casual and usually consists of verification of an employee’s Company ID card. Can security staff at this checkpoint be directed to open Mr. Belcamp’s briefcase and seize any potential digital evidence, why or why not? Support your answer.
4. There is a page in the Company’s “Employee Handbook” that states that anything brought onto the Company’s property, including the employees themselves, are subject to random search for items belonging to Provincial Worldwide. There is a space for the employee to acknowledge receipt of this notice. Mr. Belcamp has a copy of the handbook but never signed the receipt page. Does that matter; why or why not? Explain.
5. The police have not been called or involved yet, however, Mr. Newman asks if involving the police will change your incident response. Describe how you will respond to her concerning the parameters of search and seizure, and if it will change by involving the police in the investigation at this time. Support your answer.
6. You know as an Information Security Analyst that it is important to document the details of your investigation if the company wants to insure admissibility of any evidence collected in the future. However, Mr. Newman or Ms. Bass have never heard of the term “chain of custody.” How would you explain what chain of custody means, why it is important, and what could occur if the chain of custody is not documented. Support your answer.
Project Requirements:
• Each question should be answered thoroughly looking at all the issues presented, so do your research, be specific, be detailed, and demonstrate your knowledge; submitting your project through the appropriate assignment folder.
• This project should be submitted in a single Microsoft Word document (.DOC/.DOCX), with answers separated and/or numbered in respect to the question, so as to make it clear which question is being answered. It may be in a question and answer format, or as described with answers to the associated question numbers;
• The paper should be written in third-person grammar, not first person (which means – I, me, myself, etc.);
• The submission is to have a cover page that includes course number, course title, title of paper, student’s name, and the date of submission per APA writing format;
• Format: 12-point font, double-space, one-inch margins;
• It is mandatory that you do some research, and utilize outside resources! You must have a reference page at the end of your project that is consistent with APA citation style and format (see https://owl.english.purdue.edu/owl/resource/560/01/ for help).
Some helpful links the professor provided
https://www.edrm.net/glossary/chain-of-custody/
https://www.youtube.com/watch?time_continue=8&v=vJdME6vczeo
https://www.youtube.com/watch?time_continue=2&v=-YKGVL4FQ24
https://www.youtube.com/watch?v=8NlyOFgFvh8
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Instructionsmany Times The Workers Compensation Coordinator Is Somewhere Far Aw
/in Uncategorized /by developerInstructions
Many times the workers’ compensation coordinator is somewhere far away in another state, at the corporate office, or may even be a contracted service. Therefore, the EH&S Manager is the most knowledgeable individual in the plant.
With these variables in mind, develop a PowerPoint for important aspects of workers’ compensation that front line supervisors’ need to understand. The assignment is flexible so that you may choose what you feel is most important to the supervisors of the company, but the following questions should be answered:
Your PowerPoint must be a minimum of eight slides. Ensure the PowerPoint presentation has a title slide, an outline of topics to be discussed, and a reference slide at the end of the presentation. These slides do not count toward the eight-slide minimum. You must use a minimum of two resources in your presentation. All information from the resources used should be cited in accordance with APA Style guidelines
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Instructionsidentify The Major Stakeholders In Your Organization Or One With Wh
/in Uncategorized /by developerInstructions
Identify the major stakeholders in your organization (or one with which you are familiar). Analyze the top-management structure, investigate and enumerate the code of ethics (written or not written), and explain the ethical stance of all stakeholders involved in the organization. Identify the relationship among any reward systems and organizational goals and what positive or negative effect there is on employee productivity. Cite concepts and ideas from the unit readings to compliment your work.
Smit, W., Stanz, K., & Bussin, M. (2015). Retention preferences and the relationship between total rewards, perceived organisational support and perceived supervisor support. SA Journal of Human Resource Management, 13(1), 1-13. Retrieved from https://libraryresources.columbiasouthern.edu/login?url=http://search.proquest.com.libraryresources.c olumbiasouthern.edu/docview/1707081835?accountid=33337
Format your essay consistent with APA guidelines, and use at least one scholarly source from the CSU Online Library. Your essay should be two pages in length, not including the title page or reference page. All sources used must be referenced; paraphrased and quoted material must have accompanying in-text citations in the proper APA format.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Instructionsproject 1 Understanding Investigative Parametersno Directly Quote
/in Uncategorized /by developerInstructions
Project #1 – Understanding Investigative Parameters
Scenario Characters:
You: Information Security Analyst, Provincial Worldwide
Ms. Carol McPherson: Information Security Director, Provincial Worldwide (Your supervisor)
Mr. Harold Newman: Human Resources Director, Provincial Worldwide
Mr. John Belcamp: (former) engineer, Product Development Division, Provincial Worldwide
Ms. Evelyn Bass: Product Engineering Manager; Product Development Division, Provincial Worldwide (John Belcamp’s Supervisor)
**Characters will carry through Project 1, 2 and the Final Project. However, please remain conscious of who you are/what roll you play in EACH project and in regards to specific questions.
For the purposes of this project, imagine you are a Corporate Security Analyst, an employee of Provincial Worldwide and assigned to the company’s Corporate Protection Team.
In this case, you have been notified by Mr. Newman, Human Resources Director for Provincial Worldwide, that the company has just terminated Mr. John Belcamp, a former engineer in the company’s New Products Division, for cause (consistent tardiness and absences from work). Mr. Newman tells you that during Mr. Belcamp’s exit interview earlier that day, the terminated employee made several strange statements that seem to elude to a current program the company is working on.
Mr. Belcamp’s statements made Mr. Newman fear he might be taking Provincial’s intellectual property with him to his new employer (undoubtedly a competitor). In particular, Mr. Newman is worried about the loss of the source code for “Product X,” which the company is counting on to earn millions in revenue over the next several years. Mr. Newman provides you a copy of the source code to use in your investigation. Lastly, Mr. Newman tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in the future, so anything you do should be with thought about later potential admissibility in court. He tells you that in a conversation with other Corporate executives that their understanding of the investigative technological issues and how they have anything to do with a person’s right as an employee seem a bit lacking; so you will need to be detailed in any explanation.
The Fourth Amendment to the U.S. Constitution reads, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” While the Fourth Amendment is most commonly interpreted to only affect/restrict governmental power (e.g., law enforcement), the fact that a formal criminal investigation is a possibility (and the Company has no desire to be named in a civil lawsuit) means you must consider its effect to your actions.
With the above scenario in mind, thoroughly answer the following questions (in paragraph format, properly referring to and citing materials used in this course as well as outside research, where appropriate, and within a reference page at the end of the project paper).
1. Prior to any incident happening, it is important for any company to implement a “forensic readiness” plan. Discuss the benefits of a forensic readiness plan and name what you believe are the top two (2) requirements to establish forensic readiness within a private sector business like Provincial Worldwide. Support your answers. (Please note that while cyber security and digital forensics have overlaps in incident response preparation, please limit your answers here to forensic readiness in the digital forensic arena, not cyber security.)
2. Ms. McPherson, out of concern for the theft/sharing of the “Product X” source code, and after discussing the issue with one of the Corporate attorneys is requesting that you and Ms. Bass start searching the areas in which Mr. Belcamp had access within the building. Can you or Ms. Bass search Mr. Belcamp’s assigned locker in the Company’s on-site gym for digital evidence, and why? Additionally, can you or Ms. Bass use a master key to search Mr. Belcamp’s locked desk for digital evidence, whether still on site, or after Mr. Belcamp has left the premises? Support your answer.
3. A check with security confirms that John Belcamp passed through the security checkpoint when coming in to work in his vehicle. A sign at the checkpoint states that the purpose of the checkpoint is for security staff to check for weapons or other materials that may be detrimental to the working environment and employee safety. Screening is sometimes casual and usually consists of verification of an employee’s Company ID card. Can security staff at this checkpoint be directed to open Mr. Belcamp’s briefcase and seize any potential digital evidence, why or why not? Support your answer.
4. There is a page in the Company’s “Employee Handbook” that states that anything brought onto the Company’s property, including the employees themselves, are subject to random search for items belonging to Provincial Worldwide. There is a space for the employee to acknowledge receipt of this notice. Mr. Belcamp has a copy of the handbook but never signed the receipt page. Does that matter; why or why not? Explain.
5. The police have not been called or involved yet, however, Mr. Newman asks if involving the police will change your incident response. Describe how you will respond to her concerning the parameters of search and seizure, and if it will change by involving the police in the investigation at this time. Support your answer.
6. You know as an Information Security Analyst that it is important to document the details of your investigation if the company wants to insure admissibility of any evidence collected in the future. However, Mr. Newman or Ms. Bass have never heard of the term “chain of custody.” How would you explain what chain of custody means, why it is important, and what could occur if the chain of custody is not documented. Support your answer.
Project Requirements:
• Each question should be answered thoroughly looking at all the issues presented, so do your research, be specific, be detailed, and demonstrate your knowledge; submitting your project through the appropriate assignment folder.
• This project should be submitted in a single Microsoft Word document (.DOC/.DOCX), with answers separated and/or numbered in respect to the question, so as to make it clear which question is being answered. It may be in a question and answer format, or as described with answers to the associated question numbers;
• The paper should be written in third-person grammar, not first person (which means – I, me, myself, etc.);
• The submission is to have a cover page that includes course number, course title, title of paper, student’s name, and the date of submission per APA writing format;
• Format: 12-point font, double-space, one-inch margins;
• It is mandatory that you do some research, and utilize outside resources! You must have a reference page at the end of your project that is consistent with APA citation style and format (see https://owl.english.purdue.edu/owl/resource/560/01/ for help).
Some helpful links the professor provided
https://www.edrm.net/glossary/chain-of-custody/
https://www.youtube.com/watch?time_continue=8&v=vJdME6vczeo
https://www.youtube.com/watch?time_continue=2&v=-YKGVL4FQ24
https://www.youtube.com/watch?v=8NlyOFgFvh8
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Intellectual Capital Please Respond To The Following Intellectual Capital Is A
/in Uncategorized /by developer“Intellectual Capital” Please respond to the following:
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Integration Of Evidence Based Practice And Research In Nursing For This Assignm
/in Uncategorized /by developerIntegration of Evidence-Based Practice and Research in Nursing
For this assignment, you will write a 3-5-page paper giving an overview of a selected nursing theorist and his/her work. You will discuss how it is applicable to your current workplace. Nursing theorist
This paper will be in APA format – it must include a title page, page numbers, running head, properly formatted headings, citations, and references. An abstract is not required. Please address the following questions:
Introduction Jean Watson’s Philosophy of Nursing – Caring Theory
Body
Conclusion
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Interest Groups Pick A Policy Of Your Choice And Identify The Following
/in Uncategorized /by developer“Interest Groups”
Pick a policy of your choice and identify the following:
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
International Finance Please Respond To The Following Based On The Lecture And
/in Uncategorized /by developer“International Finance” Please respond to the following:
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Intermediate Corporation Asked For Your Assistance With Their Earnings Per Shar
/in Uncategorized /by developer“Intermediate corporation asked for your assistance with their earnings per share calculation for the year ended 12/31/2012. They provide you with the following information. they had 500,000 shares of stock outstanding on 1/1/2012. the average market value of each share is $25 for 2012. Their net income for 2012 was $1,200,000 and their tax rate is 40%. On April 1 they issued 75,000 shares. On June 1 they acquired 37,500 shares from the open market to use as treasury stock. Intermediate has 2000 stock options outstanding for the entire year. each option can be exchanged for one share of common stock at an exercise price of $20. In addition, Intermediate has outstanding for the entire year, a bond which was issued at par with face value of $2,000,000 and a 5% interest rate. Each $1000 bond is convertible into 20 shares of Intermediate common stock.Intermediate also has 40,000 shares of %6 convertible, cumulative preferred stock ($100 par value) which was outstanding for the full year. Each preferred share can be converted into 3 shares of common stock, No preferred dividends have been declared for the current year or the preceding 2 years.Provide basic and diluted earnings per share calculation. “
AnswerBasic Earnings per share= Net Income –Dividend on Preference sharesWeighted average no. of shares outstandingAs the dividend on preference shares has not been paid therefore wewill not…
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Intj A Is My Personality Trait If You Had To Describe Who You Are As A Future P
/in Uncategorized /by developer(INTJ-A) is my personality trait.
If you had to describe who you are as a future professional in your career field, what would you say? This lesson has prepared you to this description in three categories: personality, values, and learning style. Use what you have learned to a poster that describes who you are in these three categories. Your poster should include the following information:
Personality Describe your personality type. Highlight the areas where you think the type description applies to you most strongly. How will your career allow you to express these traits?
Values Highlight your most important career values. How will your career allow you to express these values?
Learning Preferences Highlight your top two learning preferences. Based on your learning preferences, what techniques wil be most successful for you when you must learn new information “on the job”?
Your poster should use appropriate graphics and other items to display some information visually. Consider using an online graphic design program such as Canva or JukeboxPrint. Or, use clip art and/or templates in Microsoft Word. However you choose to your poster, you must convert it to .PDF for upload to the dropbox.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Interview Questionsfor Your Final Project You Will Be Interviewing People On Bo
/in Uncategorized /by developerInterview QuestionsFor your final project you will be interviewing people on both sides of your development project. In a 2 page paper put forward some of the approaches you might adopt and what questions you might ask. This assignment should be useful in preparing you for your interview (2 pages)
Project : Granite Bridge NH
https://www.granitebridgenh.com/
https://350nh.org/resistgranitebridge/
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"