[Solved] Information Technology Security

Chief Executive Officer & Disgruntled Employee Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO’s) internet protocol (IP) address, and fully utilized CEO IP address to send belligerent email messages, making messages to appear as if the CEO is the author of offensive messages.  In the process, the organization information technology security (ITS) team was notified and started monitoring all incoming and outgoing network traffic in an attempt to catch the perpetrator or the CEO, in action.   Without a shred of doubt, the CEO was the person of interest. Tactlessly, word of the investigation leaked out within the organization and the perpetrator withdraw from repeating offensive messages. Thank goodness, information gathered from a router early in the investigation showed that the CEO’s IP address is provisionally associated with the Media Access Control (MAC) address of another computer workstation within the organization.  The discovered MAC address used to locate the antisocial computer workstation belongs to one of the disgruntled active employees who is a member of the software development department within the organization. Persistent investigation reveals that the disgruntled employee’s computer workstation is involved in this unlawful and criminal operation.  Question-1 Absolutely, there was no external malefactor; then, which component of the social engineering attack (SEA) is involved in Chief Executive Officer & Disgruntled Employee operation? Monitoring all incoming and outgoing network traffic to catch the perpetrator was not a smooth sailing operation without active involvement of the information technology security (ITS) team. Question-2                 Do you agree that the digital forensic investigator must seek assistance from the organization’s ITS team to fully exonerate the CEO? Question-3 Do you the hopeful digital forensic investigators accept that that digital forensic investigators must go through bi-annual training on TCP/IP and the Open System Interconnection (OSI) reference model to battle uncertainty in the crime scene? If Yes, provide a comprehensive narrative to support your assertion. For more information on Information Technology Security read this: https://en.wikipedia.org/wiki/Computer_security

 

Don't use plagiarized sources. Get Your Custom Essay on
[Solved] Information Technology Security
Get a 15% discount on this Paper
Order Essay

 

So much stress and so little time? We’ve got you covered. Get your paper proofread, edited or written from scratch within the tight deadline.

Quality Guaranteed

With us, you are either satisfied 100% or you get your money back-No monkey business

Check Prices
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know that being a student these days is hard. Because of this, our prices are some of the lowest on the market.

Instead, we offer perks, discounts, and free services to enhance your experience.
Sign up, place your order, and leave the rest to our professional paper writers in less than 2 minutes.
step 1
Upload assignment instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
s
Get personalized services with My Paper Support
One writer for all your papers
You can select one writer for all your papers. This option enhances the consistency in the quality of your assignments. Select your preferred writer from the list of writers who have handledf your previous assignments
Same paper from different writers
Are you ordering the same assignment for a friend? You can get the same paper from different writers. The goal is to produce 100% unique and original papers
Copy of sources used
Our homework writers will provide you with copies of sources used on your request. Just add the option when plaing your order
What our partners say about us
We appreciate every review and are always looking for ways to grow. See what other students think about our do my paper service.
Social Work and Human Services
Awesome, Work! Didn't have to add much to it. Thank You!
Customer 452587, September 7th, 2021
Psychology
I was disappointed because I didn't receive my order on time but I'm thankful to have it.
Customer 452775, December 4th, 2023
Nursing
Writer went above and beyond. Can't believe how much work they put in for the price.
Customer 452707, July 10th, 2022
Nursing
thank you
Customer 452881, October 22nd, 2023
Social Work and Human Services
Excellent Work
Customer 452587, November 22nd, 2021
Nursing
Thank you for a great paper.
Customer 452707, August 6th, 2022
Human Resources Management (HRM)
Thanks so much for your service. You have done an excellent job.
Customer 452701, October 31st, 2023
Wellness
The skilled writer did a great job on assignment!! Thank you!!
Customer 452547, June 16th, 2021
Other
AWESOME
Customer 452813, June 19th, 2022
English 101
Although a little late, the content and structure of the paper was great! I would definitely use this writer again!
Customer 452561, July 12th, 2021
Other
great
Customer 452813, June 30th, 2022
Psychology
Excellent!!!!
Customer 452587, July 28th, 2021
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.