O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Case Study: Q-Drugs

ESSENCE OF THE CASE

  • How would you begin the investigation?

  • Given the situation, would you continue to monitor the employee or stop her activity immediately?

  • Which investigative techniques could be used to successfully prove or disprove the activities of the employee?

SCENARIO

You work in the IT department for a large pharmaceutical company and are the security investigator for computer incidents. You have received a call from a manager who suspects an employee of accessing highly sensitive documents and possibly copying them. You have been asked to investigate this possibility.

Several incidents have occurred recently to raise the suspicion of the manager of the suspected employee. On several occasions, the manager has observed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required