Warning: Undefined variable $jcyhX in /home/supremepapers/public_html/qualityassignments.net/wp-includes/block-template-utils.php on line 1

Warning: Undefined variable $ettTubkWQB in /home/supremepapers/public_html/qualityassignments.net/wp-includes/nav-menu.php on line 1

Warning: Undefined variable $UUWaafE in /home/supremepapers/public_html/qualityassignments.net/wp-includes/rest-api/endpoints/class-wp-rest-menu-items-controller.php on line 1

Deprecated: Implicit conversion from float 1.7333333333333334 to int loses precision in /home/supremepapers/public_html/qualityassignments.net/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/css.php on line 52

Deprecated: Implicit conversion from float 1.7333333333333334 to int loses precision in /home/supremepapers/public_html/qualityassignments.net/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/css.php on line 52

Deprecated: Implicit conversion from float 2.5 to int loses precision in /home/supremepapers/public_html/qualityassignments.net/wp-content/themes/enfold/config-templatebuilder/avia-shortcodes/css.php on line 52

Warning: Cannot modify header information - headers already sent by (output started at /home/supremepapers/public_html/qualityassignments.net/wp-includes/block-template-utils.php:1) in /home/supremepapers/public_html/qualityassignments.net/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/supremepapers/public_html/qualityassignments.net/wp-includes/block-template-utils.php:1) in /home/supremepapers/public_html/qualityassignments.net/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/supremepapers/public_html/qualityassignments.net/wp-includes/block-template-utils.php:1) in /home/supremepapers/public_html/qualityassignments.net/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/supremepapers/public_html/qualityassignments.net/wp-includes/block-template-utils.php:1) in /home/supremepapers/public_html/qualityassignments.net/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/supremepapers/public_html/qualityassignments.net/wp-includes/block-template-utils.php:1) in /home/supremepapers/public_html/qualityassignments.net/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/supremepapers/public_html/qualityassignments.net/wp-includes/block-template-utils.php:1) in /home/supremepapers/public_html/qualityassignments.net/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/supremepapers/public_html/qualityassignments.net/wp-includes/block-template-utils.php:1) in /home/supremepapers/public_html/qualityassignments.net/wp-includes/rest-api/class-wp-rest-server.php on line 1794

Warning: Cannot modify header information - headers already sent by (output started at /home/supremepapers/public_html/qualityassignments.net/wp-includes/block-template-utils.php:1) in /home/supremepapers/public_html/qualityassignments.net/wp-includes/rest-api/class-wp-rest-server.php on line 1794
{"id":165012,"date":"2022-05-18T22:38:35","date_gmt":"2022-05-18T22:38:35","guid":{"rendered":"https:\/\/qualityassignments.net\/?p=165012"},"modified":"2022-05-18T22:38:35","modified_gmt":"2022-05-18T22:38:35","slug":"no-directly-quoted-material-may-be-used-in-this-project-paper","status":"publish","type":"post","link":"https:\/\/qualityassignments.net\/2022\/05\/18\/no-directly-quoted-material-may-be-used-in-this-project-paper\/","title":{"rendered":"No directly quoted material may be used in this project paper."},"content":{"rendered":"
\n<\/p>\n

<\/p>\n

Instructions<\/h2>\n

No directly quoted material may be used in this project paper.<\/p>\n

Resources should be summarized or paraphrased with appropriate in-text and Resource page citations.<\/p>\n

Project #1 – Understanding Investigative Parameters<\/p>\n

Scenario Characters:<\/p>\n

You: Data Security Analyst, Allied Technology Systems (ATS)<\/p>\n

Randy Capisi: Information Security Director, Allied Technology Systems (Your supervisor)<\/p>\n

Devin Roberts: Human Resources Director, Allied Technology Systems<\/p>\n

Keith Jackson: (former) engineer, Product Development Division, Allied Technology Systems<\/p>\n

Jon Dewberry: Product Engineering Manager; Product Development Division, Allied Technology Systems (Keith Jackson\u2019s Supervisor)<\/p>\n

**Characters will carry through Project 1, 2 and the Final Project. However, please remain conscious of who you are\/what roll you play in EACH project and in regards to specific questions.<\/em><\/p>\n

For the purposes of this project, imagine you are a Data Security Analyst, an employee of the Allied Technology Systems and assigned to the company\u2019s Data Protection Team.<\/p>\n

In this case, you have been notified by Mr. Devin Roberts, Human Resources Director for Allied Technology Systems, that the company has just terminated Mr. Keith Jackson, a former engineer in the company\u2019s New Products Division, for cause (consistent tardiness and absences from work). Mr. Roberts tells you that during Mr. Jackson\u2019s exit interview earlier that day, the terminated employee made several statements to the effect of \u201cit is okay because I have a new job already and they were VERY happy to have me come from ATS, with ALL I have to offer.\u201d<\/p>\n

Jackson\u2019s statements made Mr. Roberts fear he might be taking Allied\u2019s intellectual property with him to his new employer (undoubtedly a competitor). In particular, Mr. Roberts is worried about the loss of the source code for \u201cProduct X,\u201d which the company is counting on to earn millions in revenue over the next several years. Mr. Roberts provides you a copy of the source code to use in your investigation. Lastly, Mr. Roberts tells you to remember that the Company wants to retain the option to refer the investigation to law enforcement in the future, so anything you do should be with thought about later potential admissibility in court.<\/p>\n

The 4th Amendment to the U.S. Constitution reads, \u201cThe right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.\u201d While the 4th Amendment is most commonly interpreted to only affect\/restrict governmental power (e.g., law enforcement), the fact that a formal criminal investigation is a possibility (and the Company has no desire to be named in a civil lawsuit) means you must consider its effect to your actions.<\/p>\n

With the above scenario in mind, thoroughly answer the following questions (in paragraph format, properly referring to and citing materials used in this course as well as outside research, where appropriate, and within a reference page at the end of the project paper).<\/p>\n

1. Prior to any incident happening, it is important for any company to implement a \u201cforensic readiness\u201d plan. Discuss the benefits of a forensic readiness plan and name what you believe are the top three (3) requirements to establish forensic readiness within a private sector business like Allied Technology Systems. Support your answers. (Please note that while cyber security and digital forensics have overlaps in incident response preparation, please limit your answers here to forensic readiness in the digital forensic arena, not cyber security.)<\/p>\n

2. Mr. Roberts, out of concern for the theft\/sharing of the \u201cProduct X\u201d source code, is requesting that you, your supervisor, or Mr. Dewberry start searching the areas in which Mr. Jackson had access within the building. Can you or Mr. Dewberry search Jackson\u2019s assigned locker in the Company\u2019s on-site gym for digital evidence? Support your answer.<\/p>\n

3. Can you or Mr. Dewberry use a master key to search Jackson\u2019s locked desk for digital evidence, after Keith Jackson has left the premises? Support your answer.<\/p>\n

4. The police have not been called or involved yet, however, Mr. Roberts asks how involving the police will change your incident response. Describe how you will respond to Mr. Roberts concerning how the parameters of search and seizure will change by involving the police in the investigation at this time. Support your answer.<\/p>\n

5. There is a page in the Company\u2019s \u201cEmployee Handbook\u201d that states that anything brought onto the Company\u2019s property, including the employees themselves, are subject to random search for items belonging to Allied Technology Systems. There is a space for the employee to acknowledge receipt of this notice. Mr. Jackson has a copy of the handbook but never signed the receipt page. Does that matter? Explain.<\/p>\n

6. Allied Technology Systems uses a security checkpoint at the entrance to the building. A sign adjacent to the checkpoint states that the purpose of the checkpoint is for security staff to check for weapons or other materials that may be detrimental to the working environment and employee safety. Screening is casual and usually consists of verification of an employee\u2019s Company ID card. Can security staff at this checkpoint be directed to open Mr. Jackson\u2019s briefcase and seize any potential digital evidence? Support your answer.<\/p>\n

7. You know that it is important to document the details of your investigation if the company wants to insure admissibility of any evidence collected in the future. However, Mr. Roberts has never heard of the term \u201cchain of custody.\u201d How would you explain to Mr. Roberts what the chain of custody means, why it is important, and what could occur if the chain of custody is not documented. Support your answer.<\/p>\n

Project Requirements:<\/p>\n

\u2022 Each question should be answered with a minimum of 1-2 paragraphs, so do your research, be specific, be detailed, and demonstrate your knowledge; submitting your project through the appropriate assignment folder.<\/p>\n

\u2022 Answers to the above questions should be submitted in a single Microsoft Word document (.DOC\/.DOCX), with answers separated and\/or numbered in respect to the question, so as to make it clear which question is being answered. It may be in a question and answer format, or as described with answers to the associated question numbers;<\/p>\n

\u2022 The paper should be written in third-person grammar, not first person (I, me, myself, etc.);<\/p>\n

\u2022 The submission is to have a cover page that includes course number, course title, title of paper, student\u2019s name, and the date of submission per APA writing format;<\/p>\n

\u2022 Format: 12-point font, double-space, one-inch margins;<\/p>\n

\u2022 It is mandatory that you do some research, and utilize outside resources! You must have a reference page at the end of your project that is consistent with APA citation style and format (see https:\/\/owl.english.purdue.edu\/owl\/resource\/560\/01\/<\/a> for help).<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

Instructions No directly quoted material may be used in this project paper. Resources should be summarized or paraphrased with appropriate in-text and Resource page citations. Project #1 – Understanding Investigative Parameters Scenario Characters: You: Data Security Analyst, Allied Technology Systems (ATS) Randy Capisi: Information Security Director, Allied Technology Systems (Your supervisor) Devin Roberts: Human Resources […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_joinchat":[]},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/qualityassignments.net\/wp-json\/wp\/v2\/posts\/165012"}],"collection":[{"href":"https:\/\/qualityassignments.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/qualityassignments.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/qualityassignments.net\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/qualityassignments.net\/wp-json\/wp\/v2\/comments?post=165012"}],"version-history":[{"count":0,"href":"https:\/\/qualityassignments.net\/wp-json\/wp\/v2\/posts\/165012\/revisions"}],"wp:attachment":[{"href":"https:\/\/qualityassignments.net\/wp-json\/wp\/v2\/media?parent=165012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/qualityassignments.net\/wp-json\/wp\/v2\/categories?post=165012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/qualityassignments.net\/wp-json\/wp\/v2\/tags?post=165012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}