Back to category: Technology

Limited version - please login or register to view the entire paper.

privacy in workplace

Romansoft Corp., a large international corporation has learned of several security breaches undergone by an unknown and unauthorized perpetrator. Someone has sold company email addresses to groups of spammers, diverted funds to unauthorized accounts and altered online blueprints of important company products. Evidence of outside hackers has been detected however there is no information to indicate whether they committed any of the above offences. This leaves open the possibility that someone from inside the company has committed the crimes. In attempt to locate the delinquents, a brief plan has been outlined.
To start things off, all logs regarding the email system, accounting system and the online server should be pieced together and analyzed. For every instance that the affected data was accessed, a record of when and by whom should be made. The location of where this change occurred should also be recorded. This will result in a very large list being compiled however te...

Posted by: John Mayes

Limited version - please login or register to view the entire paper.