In this course you have assumed the role of a forensics


In this course, you have assumed the role of a forensics investigation trainee at Two Way Communications. You have received positive feedback from the CEO regarding your last report, and you are asked to train with the Internal Security department. Your first task with Internal Security is to investigate allegations involving one of the company's sales account managers.

Read the following project information, if needed.

With the Internal Security department, you are investigating the activities of a sales account manager at Two Way Communications, Inc. He is allegedly using personal social media accounts and unapproved email techniques to market company products to potential customers. The company has received a number of complaints about receiving unsolicited emails from the sales account manager. Company policy clearly states that sales account managers may use approved channels to reach potential customers, and that they are not allowed to use personal social media accounts. The CEO asks you to write a one-page report describing the following.

  • The evidence suggests that the employee is collecting email addresses using his personal contacts' social media accounts. He is creating lists of these email addresses and sending out mass emails asking for recipients to provide him with their phone numbers, so he can reach them via phone to try to make a sale. He has been including the company's logo at the top of the messages. Write a paragraph that explains which type of email fraud this is.
  • Midway through your investigation, a family member of the sales manager received one of the unsolicited emails and found it suspicious, so she printed it and shared it with the sales manager himself. The sales manager then asked Internal Security to investigate the incident. Consider whether this development indicates that the sales manager may not be involved in the fraudulent activity. Write a paragraph describing the steps you would take to collect evidence and figure out whether or not the employee is behind the emails.
  • Your supervisor collects the employee's mobile phone to be searched for evidence. The mobile phone has a SIM card. List the steps you would take to access the data on the SIM card and any tools that can be used to read the card

Be sure to fully answer all questions and prompts, and provide justification for your answers when necessary.

Submit the assignment as a Microsoft Word document using the template provided to the Unit 4 Part 3 Dropbox in  APA format.

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: In this course you have assumed the role of a forensics
Reference No:- TGS02166254

Now Priced at $25 (50% Discount)

Recommended (92%)

Rated (4.4/5)