ESSENCE OF THE CASE
Here are the essential elements in this case:
Richard is the overnight system administrator for Needmore Security, Inc. At approximately 8 p.m., he began to receive alarms from Needmore's intrusion-detection system indicating a high level of IP sweep and port-scanning activity. Following proper procedures, Richard made note of this activity in the security log and increased his level of vigilance.
At 9:45 p.m., Richard received a telephone call from one of Needmore's executives traveling overseas. He said that he was having difficulty locating some of his files and wanted to know whether ...