Preview

Crime Investigation Case Study

Satisfactory Essays
Open Document
Open Document
283 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Crime Investigation Case Study
Location: Fort Lauderdale, Florida

8:00 a.m. – A terrorist group hacks into the local police department and Sherriff's office. The hacking causes the entire computer system to shut down, including all computer aided design software, record management systems, and operating systems on laptops.

8:10 a.m. - The local hospital's network has been compromised and is not allowing employees to access any of the computers.

8:20 a.m. - Fort Lauderdale Airport's computer system has completely shut down; the reason is unknown.

8:30 a.m. - Bank A, the largest bank in South Florida, found out that their system has been hacked into and millions of dollars have been stolen from numerous bank accounts.

Consider the following questions:

• What are the ramifications of these incidents?
• Who is affected?
• What may be the outcomes?

Imagine that you occupy one of the following positions: the police chief, the city mayor, the bank's chief executive officer, the airport's director of security, or the hospital's chief executive officer. In relation to your position, identify the steps you would take to address how to recover data, secure the establishment, and investigate the crime.

Review the information from the Cyberattack Scenario.
Create a 10- to 15-slide Microsoft® PowerPoint® presentation that includes a step-by-step restoration and recovery plan. This plan must create strategies to restore information-system operations in the event of an attack or failure.
Make sure to address the following points in the step-by-step plan:
• In relation to your position, identify the steps you would take to address how to recover data, secure the establishment, and investigate the crime.
• Include the strengths and weaknesses of contemporary methodologies and technologies designed to protect information systems and data as part of your plan’s justification.

You May Also Find These Documents Helpful

  • Good Essays

    case studies P4 M3 D2

    • 1585 Words
    • 4 Pages

    For each of these case studies; - Explain possible priorities and responses that should be made when dealing with these incidents (P4) Case study 1 –This case study is set in Sunny Side’ nursery and during a delivery the door was left open and an intruder entered the building without signing in and is unknown to the staff. The receptionist upon arriving back at her desk notices on CCTV that there is an intruder, she now has to assess what her priorities and responses to this incident must be.…

    • 1585 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    IVK Corporation experienced a sudden shutdown of the customer relationship management (CRM) enterprise information system. The information system shutdown was caused by extensive traffic entering IVK’s network of CRM servers from many locations—an organized attack designed to prevent IVK’s security systems from identifying the attempted intrusion into its corporate network. As a result of the attack, the CRM system will not reboot; customer records cannot be accessed; the CRM system is jammed.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Describe potential risks to the information and the related vulnerabilities within the organization. Identify the forces that drive each threat and the related vulnerabilities.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Disaster Plan It

    • 1313 Words
    • 6 Pages

    123 Textiles Corporation is located in a high-crime area that also experiences occasional earthquakes. A new network was set up with the server by a window. All systems are backed up once a month on an exterior drive. One night, a thief entered through the window and stole the server.…

    • 1313 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    effective a baseline installation of the Operating System is required. With the use of In-…

    • 885 Words
    • 4 Pages
    Better Essays
  • Good Essays

    3. What was the President's Commission on Organized Crime? What did the Commission reveal about Organized Crime?…

    • 216 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Level 5 HSC Skills Scan 2

    • 301 Words
    • 2 Pages

    6. What is your involvement with evaluating and developing policies, procedures and practices to identify, assess and manage risk to individuals and others?…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    7. Assist in the investigation of difficult and problem accounts. Follow­up and/or take the appropriate…

    • 565 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Crime Case Analysis Report

    • 1938 Words
    • 5 Pages

    Case Overview: On the 15th of January 2002 around 8pm two brothers, Sebastian (the defendant) and Attila (his brother), entered Bradbury Inn Tavern and started consuming alcohol. But around 9:45 the brothers were involves in a fight with customers and hotel staff. Attila, the defendant’s brother, was said to have major involvement in the fight. It was alleged that he, the defendant, struck a male patron before becoming involved in a scuffle with a number of men, ultimately being rescued by his brother. As the fight grew out of hand the two brothers retreated, however on the way Attila threatened a hotel employee and obtained a security tape that recorded his conduct. However the two brothers were arrested and the tape was located at a nearby garden. Sebastian, the defendant in this case was charged with affray and assault. Although the offences were done committed by both of the brothers, they were tried separately, this case involves the trail of Sebastian Fajka who, relative to his brother, did not do as much but was still charged with acts he did not commit due to important evidence being left out and ignored by the judge. Furthermore, throughout this case the judge shows signs of being bias towards the crown. The defendant appealed which was successful and caused the punishment to be greatly reduced.…

    • 1938 Words
    • 5 Pages
    Better Essays