Plan for Processing the Crime assignment help

criminology

Description

There are four (4) questions and the maximum point values are included with each question.

The recommended length for the final exam is 10 - 15 doubled spaced pages excluding diagrams,

illustrations or other addendum. The use of APA formatting is required for any in-text citations and

reference list.  Each response is to immediately follow the question as follows:

1. Tasking A -- approximately 600 - 1000 words (2 - 4 pages) excluding diagrams, illustrations or other

addendum.

2. Tasking B -- approximately 600 - 800 words (2 - 3 pages) excluding diagrams, illustrations or other

addendum.

 

3. Tasking C -- approximately 600 - 800 words (2 - 3 pages) excluding diagrams, illustrations or other

addendum.

 

4. Tasking D -- approximately 600 - 800 words (2 - 3 pages) excluding diagrams, illustrations or other

addendum.

________________________________________________________________

Scenario

You are the lead forensics investigator for XYZ, Inc. -- an industry leading cyber forensic company. You

have just been notified that a top 5 health care company (HCC Partners in Life) has hired your company

to investigate a potential breach of their medical records system.

The HCC Security Operations Center (SOC) identified some “inconsistencies” in the intrusion detection

system (IDS) logs that caused the reliability to be questioned. HCC uses Snort IDS’ running on Linux

systems. In addition, the lead HCC database administrator received a strange e-mail from Human

Resources (HR), which contained a benefits attachment. When she opened the attachment, the

document was blank. She noticed that her system has been acting “strangely” after opening the

attachment. She operates a Microsoft Windows XP workstation.

Your team has been tasked with analyzing the HCC network, database server, and any workstations you

suspect to determine if there was a breach and any potential patient data leakage. The database server is

a Microsoft Windows 2003 Server running Microsoft SQL Server 2008.

If there is any evidence of a breach, HHC has a history of taking these types of incidents to court for

prosecution to the full extent of the law.

Instruction Files

Related Questions in criminology category


Disclaimer
The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.