Assignment 7

docx

School

American Public University *

*We aren’t endorsed by this school

Course

ISSC452

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by AmbassadorHummingbirdPerson531

Report
Computer Forensics Kyle Namen American Public University Cybersecurity ISSC452 Dr. Ron L. Booth 12/19/2023
2 Hello Jonathan, I appreciate that you trust in my ability to solve your case. Because only one other person has access to the ledger and checkbook, it seems like there are only two possibilities: the employee who has access is in on the scam, or the items have been misplaced and the timing is just a coincidence. I am ruling out theft because if someone had stolen the checkbook, they would not call to have you write a check, alerting you to the missing items. First, I would like you to contact your employee and ask if they have the ledger and checkbook. If they have the items and readily give them up, it is unlikely they are involved in this incident. However, if they do not give them back easily or claim they do not possess the items, it could mean they are still in the process of covering something up. In the meantime, I would like access to your computers and work phones if you have them. The employee may have been in communication with the subcontractor to set up this scam so they could split the extra money. I will use my software to search for messages and emails, along with users who logged in to the devices. Depending on the type of accounting program you have, I may be able to track sign-in times and activity ( International Association of Chiefs of Police, 2015) . I believe that since you checked the program and agreed over the phone to the new price, that someone has gone into that system to change the data so that you would believe they are owed the new amount and removed the books so that you cannot double-check. I would also like for you to check your bank account and verify if the original check has been cashed or not. It is still entirely possible that this is a mistake, but if the check has cleared, then they would not be asking for a duplicate check. Additionally, I will create a backup of the accounting system data, but I would like you to maintain this backup moving
3 forward. Do not tell anyone about it. This will provide a failsafe in the future that will allow you to compare numbers with the backup file to catch if anything has been edited without your knowledge ( Marcella, 2008) . Once we have information about the whereabouts of the items and banking information, I will piece that together with what I find on your devices to provide you with the evidence. Thanks again for choosing me to resolve this incident for you. Kyle Namen
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 References International Association of Chiefs of Police. (2015). Cybercrime Investigations - Law Enforcement Cyber Center. Law Enforcement Cyber Center. https://www.iacpcybercenter.org/officers/cyber-crime-investigations/ Marcella, A. J., & Menendez, D. (2008).  Cyber forensics : a field manual for collecting, examining, and preserving evidence of computer crimes . Auerbach Publications.