The graduate conducts an analysis on gathered evidence using forensic cyber tools to determine the nature of a security breach.
INTRODUCTION
As more companies store information electronically, there is an increased need for digital forensics to discover the trails of illegal or malicious acts. In this task, you will use the scenario to develop an investigative plan of action that will prepare your investigative team to conduct an analysis on the gathered evidence.
SCENARIO
An oil company’s senior management has reason to suspect that John Smith, one of the company’s mechanical engineers allegedly took information that was clearly identified as proprietary. The company’s legal office has requested digital evidence regarding the potential violation of company policy, which prohibits the sharing of proprietary information without prior approval. The employee was not authorized to access proprietary information. All employees sign nondisclosure agreements (NDAs) and acceptable use policies (AUPs). Senior management and the legal office have approved this request.
A. Create an investigative plan of action based on forensic best practices or standards that your team will implement by doing the following:
B. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.