StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Email Leaks investigation - Essay Example

Cite this document
Summary
Email Leaks investigation.
As the Chief Information Technology Administrator for XYZ Company, my senior vice president called me into his office this morning for a confidential meeting…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Email Leaks investigation
Read Text Preview

Extract of sample "Email Leaks investigation"

As the Chief Information Technology Administrator for XYZ Company, my senior vice president called me into his office this morning for a confidential meeting. He has been concerned for some time that his emails sent from his office computer have been leaked to unauthorized individuals, both inside and outside of the company. For instance, XYZ has been contemplating purchasing the struggling ABC, a competing company with similar products. When the vice president emailed the Chief concerning possible stock prices for the takeover bid, it seemed the leadership at ABC knew about it as early as the next day, even though it was an internal XYZ email.

Therefore the VP asked me to investigate as to where the attacks were coming from. The following is the plan for my investigation. XYZ uses Exchange 2010 and Microsoft (MS) Outlook. Additional security for the PC’s is provided by the use of smart card technology. E-mail also uses Secure Multipurpose Internet Mail Extensions (S/MIME) so that confidential letters such as the example above are automatically encrypted. On their website for Exchange, MS says S/MIME “help control access to data and ensure trusted communications both inside and outside the network” (2012).

Knowing that the vast majority of security leaks are internal I asked the VP point blank if there could possibly be anybody inside the company that could possibly have his credentials, such as a secretary or trusted assistant. He assured me that was absolutely not the case, as he had come there from the Defense Department. His supervisor there was having an affair with an employee. Having gained access to the woman’s computer, the employee sold top secret information to a friendly nation. They both went to jail and since then the VP took great pains to ensure his technical equipment was secure.

Through confidential investigation, I was able to determine neither the CFO nor her staff was the culprit either. Therefore the leaks had to come from some sort of attack on the system. The emails had to have been intercepted somehow and I set out to find out how that was possible. Anybody can be hacked and hit with service interruptions and it is not a reflection on any one employee. All one has to do is ask the myriad of companies that have lost credit card and personal data of their customers.

The Department of Veterans’ Affairs had an infamous incident a few years ago where they misplaced the personal data of thousands of vets. The hacker group Anonymous launched a cyber attack against Texas police in 2011 in “retaliation for the arrests” of several members and many hundreds of such things as passwords, SSN, and dates of birth were stolen (2011). For some time, at my suggestion, the company has employed Websense and we currently use its version 7.7. It is a data security program that attempts to interrupt any threats and attacks and destroy them.

Yet any IT person will tell you no system is completely foolproof and even Websense only claims to be 99.999% effective. Yet the software has a tool that will be invaluable to me in my inquiry. Its Exchange Discovery Wizard (EDW) will allow one to institute a policy to scan the Exchange servers for threats and attacks. EDW can even be set to crawl through individual mailboxes and the nice thing about it is the time of the scan can be set to maximize privacy and minimize time spent in the search.

I plan to do exactly that for the mailboxes of both the VP and CFO. With the time and date stamp of the letter in question and matching the email in both boxes, Websense should then be able to issue a detailed report and I will be able to work from there (2012). There is another distinct possibility for the email leaks. Our company’s leadership has embraced smart phone technology and the executives have grown quite used to being in constant contact. Their email has been mapped to the phones.

MacAfee cyber security specialists have been tracking the Chinese for technology espionage and have identified 72 government and corporate sites that have targeted for attack by agents of that country. Especially vulnerable are the Google Android operating systems which our company’s phones unfortunately employ (2012). If the Websense investigative report entails the email was either sent or received from a mobile device, I will ask permission from the VP to examine both phones for security leaks and attacks.

There is a new company called CrowdStrike powered by former MacAfee investigators which specializes in such things and with their help I should be able to determine if a threat exists and neutralize it. References: Microsoft Exchange, 2012, Advanced Email Security, viewed October 14, 2012, Poeter, Damon, 2011, PC World, Anonymous Hack of Texas Police Contains Huge Amount of Private Data, viewed October 14, 2012, . Websense, 2012, Performing Exchange Discovery, viewed October 14, 2012, Dilanian, Ken, 2012, Los Angeles Times, Smartphone security gap exposes location, texts, email, expert says, viewed October 14, 2012,

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Email Leaks investigation Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Email Leaks investigation Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1458619-week
(Email Leaks Investigation Essay Example | Topics and Well Written Essays - 750 Words)
Email Leaks Investigation Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1458619-week.
“Email Leaks Investigation Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1458619-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Email Leaks investigation

Use of informants in criminal investigation

The use of informants in investigation has a long history of Identifying motivators, insuring the informant has access to the information that is desired, and maintaining control over the informant are the essential components for successful use of an informant in an investigation....
5 Pages (1250 words) Essay

Investigation of the crime or unlawful activity

investigation of any crime or unlawful activity is a precursor to bring the guilty to the rule of law and delivering justice; therefore, investigators play a crucial role in detecting and deterring crimes and other unlawful activities in the society.... Besides, investigative agencies may hire specialized professionals such as forensic experts in case of the criminal investigation, CPA or other qualified management experts in case of the financial scam, depending upon the services required....
5 Pages (1250 words) Essay

The Sole Reason for Carrying Out the Investigation

This sole reason for carrying out this particular investigation is to determine the origin of a controversial email information that contained a spreadsheet entailing confidential company information and how it eventually ended up on a competitors website.... The spreadsheet file… This has subsequently led to the need to carry out an investigation to audit the origin of the file and the reason as to why the file was submitted.... The CEO, Alison is the paramount who authorized the investigation to be carried out to facilitate the troubleshooting and identification of the origin of the communication and email threads that eventually led to the information leak....
4 Pages (1000 words) Case Study

Digital Forensics Project

In the technical aspects of the investigation, digital forensics has several sub-branches that relate to the digital devices that have been in use.... The files for investigation are true images retrieved from the hard drive of the computer (Marcella & Guillossou, 2012).... Three files are available for investigation namely, Thumb drive....
8 Pages (2000 words) Essay

E-mail and social media investigations

Numerous ways are used to obtain the information fraudulently such as through scam emails that lure individuals into communication that leads to obtaining sensitive information… Spear phishing is an email scam that has the aim of obtaining access to sensitive information to a specific group or organization through trusted e-mails E-mail and social media investigations E-mail and social media investigation Question Phishing involves a criminal activity that aims at gaining sensitive information in a fraudulent way....
1 Pages (250 words) Article

Sex-Crime Related Investigations

The author of the "Sex-Crime Related Investigations" paper states that empirical data can be collected from the successful investigation of sex crimes to formulate guidelines and practices that help as beacons of light for future sex crime investigations.... Sex crime investigator is an investigator who has been taught to be sensitive to the physical, psychological and emotional needs of sexual assault victims and has been trained in what is required for the sexual investigation of sexual assaults (Becker, 2008, p....
6 Pages (1500 words) Literature review

Intelligent Email Analysis

A selection of email products is made to provide information, communication and exchange of the facts and figuresOne of the requirement analysis tools for investigation is the dataset since it has a lot of integrity issues.... This essay "Intelligent email Analysis" focuses on email messages which exist due to the central role played by email in a firm.... nbsp;… An email analysis reveals the number of internet users, recovers facts and figures and maintains a full analysis even after the system is formatted....
6 Pages (1500 words) Essay

The Knowledge of the Investigating Officer for the Success of the Investigation Process

This science might be traced back to the year 1984 when the United States of America's federal investigation bureau laboratory and other law enforcement agencies started to develop programs to examine evidence from computers.... According to McKemmish , (1999) “Cyber forensics is the process of extracting information and data from a computer storage media, analyzing and presenting digital evidence in a manner that is legally acceptable via the application of computer technology to the investigation of computer based crime”....
15 Pages (3750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us