O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Case Study: Investigating a Computer Crimes Case

SCENARIO

ESSENCE OF THE CASE

Here are the essential elements of the case:

  • Minimize the damage to the firm from loss of the key files.

  • Protect the firm from further data loss.

  • Collect evidence that can be presented to the police to build a case against the former employee.

Jeff is a security consultant who has been hired by a small law firm to beef up their security and check their network for security flaws. As part of his overall security check, Jeff implements security auditing on the authentication servers. In reviewing the security logs, he discovers that someone is accessing the network remotely, using a VPN to log on with the account name and password of a former employee who was fired two ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required