Tuesday, January 28, 2020
Using Computer Forensics to Investigate Employee Data Theft
Using Computer Forensics to Investigate Employee Data Theft Introduction Over 25 percent of employees steal proprietary data when departing a company or organization.[1] To that end, our experience shows that departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company. Ã Ã When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft of IP analysis in order to preserve electronic data and uncover important evidence. Using specialized software, the expert can reveal digital footprints such as: USB activity Files recently opened Cloud storage usage Files sent to personal email accounts Recently printed documents The results of the analysis can provide the foundation for legal action such as a temporary restraining order, permanent injunction, subpoena of personal devices, or other litigation to prevent the misappropriation of company data. When Employee Data Theft Is Suspected Employee data theft occurs most frequently just prior to, or immediately after, an individuals termination or resignation from an organization. Telltale signs that an investigation is warranted include unusual activity by the employee, such as: Plugging a personal USB thumb drive or hard drive into a computer Coming into work at odd hours or establishing remote desktop connections during off-hours Transferring large amounts of data on the company network Visiting file sharing sites like Dropbox or Google Drive Sending emails with attachments to personal accounts If there are concerns that a departing employee has stolen proprietary data, then it is important to take steps not to delete important electronic evidence located on his or her computer. If the computer is powered on, then leave it on, because important evidence may be stored on the computers random access memory and could be deleted if the computer is powered off. Also, ensure the computer cannot be accessed remotely by disconnecting it from the network. If the computer is already turned off, then place it in secure storage. Furthermore, confirm the employees login credentials are disabled or have been changed, but do not let the IT staff reinstall the operating system or reassign the computer to another employee. Such actions could destroy or overwrite any evidence of wrongdoing. Finally, resist the temptation to take a peek at what is stored on the computer by turning it on and accessing files because this could alter the data, thereby making the investigation more complex. If the suspected employee had a company-issued cell phone, then place it in secure storage as well. Smartphones hold an abundance of useful information such as text messages, emails, call logs, internet activity and more. The simple act of resetting the phone, however, can permanently destroy this data. IP Theft Investigations Preserving and Analyzing Electronic Evidence The first step in a theft of IP investigation is to forensically preserve the data on the employees device(s). The computer forensics expert will create chain of custody documentation, photograph the hardware, and verify the integrity of the preserved data, among other things. These steps ensure that the electronic evidence will be admissible in court. Once the data is preserved, the next step in the investigation is to perform an analysis to identify software and artifacts that may be indicative of IP theft. These areas on a typical Windows installation include: USB activity Files recently opened or deleted Cloud storage Personal email accounts Internet history report Printed documents USB Activity Analysis Many of todays USB devices, such as thumb drives and external hard drives, have enough storage capacity to save an entire copy of a users hard drive. As such, they are one of the most common tools used to steal data. The good news is that using a USB device leaves behind a trail of digital evidence that can prove invaluable to an investigation. Analyzing a users USB activity can reveal several key facts regarding what was connected to the computer and when. In most cases, forensic experts can determine the serial number and/or brand of the USB device, as well as the first and last time the device was connected to the computer. In some instances, they may also be able to verify each time a specific USB device was connected. Oftentimes, the analysis will reveal that an external USB hard drive or flash drive was connected for the first time during an employees last week of employment. While most analyses reveal a new USB connection, it is also possible that a device used throughout the duration of the suspects employment was never returned. A device such as this would likely contain numerous documents and files that were related to the employees day-to-day activities and could contain value to a competitor. If it is a requirement that employees return company-owned USB drives at the end of their employment, forensic experts have the ability to verify whether or not that policy was upheld. Files Recently Opened While confirming that a USB device was connected to a computer is significant, it is even more important to know what files were accessed and potentially transferred to the device. The Microsoft Windows operating system creates various artifacts when a user opens a file or folder. These artifacts indicate what was opened, when it was opened and where it was opened from. A classic red flag is if the employee was opening files during the last week of employment that were not related to the work being performing during that time. Another consideration is the organizations data access policy. If data access restrictions are not in place, then the employee may be able to access company files unrelated to current work that are stored on the network. The existence of these artifacts when combined with a USB activity timeline can indicate a high probability that data was copied off the system. Lastly, the artifacts can also contain specific information about where the file existed. If a file was opened from a USB drive, the artifact will indicate this, providing factual evidence that the suspect is in possession of a USB drive that contains specific files. For example, combining a USB analysis and files recently opened analysis could show that on October 7, 2016, at 7:22:08 a.m., a non-company-issued SanDisk thumb drive with serial number 851450 was plugged into the computer for the first time and a file titled Client Contact List.xlsx was opened. Cloud Storage If the analysis shows that certain files were accessed but no USB activity was detected, the next step in the investigation is to identify evidence that a cloud storage provider such as Dropbox, Google Drive or Microsoft OneDrive was accessed. The purpose of these applications is to share and sync data across multiple computers. For example, Dropbox may have been surreptitiously installed on the employees work computer as well as his or her home computer. Consequently, the simple act of syncing a company file to Dropbox will instantaneously also make that file available on the employees home computer. The good news is that cloud storage applications often have corresponding log files and databases that record what files the user accesses and what activities are performed. These logs can signify files have been uploaded to the cloud in the past even if they have already been deleted from the shared folder. Some of these applications even save deleted data in a separate hidden folder on the computer itself that users typically are not aware of. As a result, a theft of IP analysis may show that Dropbox was installed on the users work computer and that early in the morning on October 7, 2016, fifty files were deleted and the hidden folder reveals these were company files. Personal Email Accounts Some individuals may use their company email to send attachments to their personal email account such as Yahoo or Gmail. In these cases, forensic experts are able to perform a preservation of the employees work email to identify and document the evidence of misconduct. Internet History Report An Internet history report can be generated that shows, inter alia, recent Internet searches, web sites and pages visited, cookies from websites, and Internet downloads that occurred. Such information is helpful in establishing what an individual thought was important or even their state of mind. For example, analysts have discovered that individuals have searched on how to delete data or copy data surreptitiously and that they reviewed websites that were in essence how to manuals to perform certain deleterious acts. Paper Documents Finally, individuals who are a little less aware of more modern techniques to copy data will simply print the documents they wish to take out the door. In these cases, forensic experts are able determine the last known print date of Microsoft Office documents. Deliverables and Project Timeframe The turnaround time for a theft of IP analysis performed by an analyst is typically one week. Deliverables provided will be easy to understand in the form of spreadsheets, html reports, and written reports containing the findings of the analysis. A forensic expert should also spend time with the client either over the phone or in person to discuss the reports in detail so that they know exactly what a report contains and the assumptions and opinions of the forensic expert. If necessary, an expert will also provide depositions or expert witness testimony regarding the authenticity of the evidence and their findings. Authors Timothy M. Opsitnick, President, JURINNOV, LLC, Joseph M. Anguilano, Director of Operations, and Trevor B. Tucker, Forensic Analyst. JURINNOV, LLC, a wholly-owned subsidiary of Technology Concepts Design, Inc. (TCDI), is a technology company that provides cybersecurity and eDiscovery services. Cybersecurity consulting includes investigating accidental or malicious data breaches as well as providing security strategies and assessments to prevent such occurrences. eDiscovery consulting includes computer forensic investigations and ASP ESI hosting. JurInnov news and information is available at www.jurinnov.com. For over 25 years, TCDI has been providing technology solutions through partnerships with large corporations and law firms. These solutions include advanced litigation support software and services for electronic discovery, hosted review and production, and large-scale litigation case file management. TCDI news and information is available at www.tcdi.com. [1] Biscom, Employee Departure Creates Gaping Security Hole Says New Data, December 23, 2015; https://www.biscom.com/employee-departure-creates-gaping-security-hole-says-new-data/.
Monday, January 20, 2020
Open Systems Interconnection (OSI) Model Essay -- essays research pape
Open Systems Interconnection (OSI) Model This memorandum will attempt to explain the Open Systems Interconnection Model, known more simply as the OSI Model. The OSI Model has seven levels, and these levels will be discussed in detail. Particular mention will be made to which level TCP/IP functions with the OSI Model. The seven levels of the OSI Model are as follows: 7) Application: Provides different services to the applications. 6) Presentation: Converts the information. 5) Session: Handles problems which are not communication issues. 4) Transport: Provides end to end communication control. 3) Network: Routes the information in the network. 2) Data Link: Provides error control between adjacent nodes. 1) Physical: Connects the entity to the transmission media. In simple terms, the OSI model defines a networking framework for implementing protocols. Is defines seven levels to accomplish this. Control is passed from one level to the next, starting at the Application level (Level Seven) and working its way through the levels until it reaches and completes Level One, the Physical level. Once this cycle has been completed, control moves to the next station on the network and back up the hierarchy. Since the process begins at the seventh level, the Application level, it will be detailed first. As its name implies, this Application level supports applications, but it also supports other end-user processes. User authentication and privacy on the network is consid...
Saturday, January 11, 2020
Bajaj auto Essay
The project report entitled ââ¬Å"Strategic Management Cycle of Baja] Auto Ltd â⬠. has been submitted to Gujarat Technological University, Ahmedabad in partial tultlllment tor the award of degree of Master of Business Administration. I the undersigned hereby eclare that this report has been completed by me under the guidance of Prof. Jignasha mamâ⬠(Faculty Member, Shayona Institute of Business Management, Ahmedabad) The report is entirely the result of my own efforts and has not been submitted either in part or whole to any other institute or university for any degree. Date: Place: Ahmedabad PREFACE As it is always said that if you give some-one theory knowledge it will make person understandwell. But if you give some-one theory as well as practical knowledge then it will help the person to understand and remember that always. In the same way to get practical knowledge,the report which we prepare not only make us understand the various functions but also gives us different vision regarding them and along with it gives us experience of practical assignment and managerââ¬â¢s work. By preparing report on Analytical Study on Strategic Management Cycle of Baja] Auto Ltd. we have tried to develop skill to understand well and also how to implement theoretical knowledge work. For this we are thankful to Gujarat Technological University for including such a project as practical studies in the syllabus of M. B. A. Acknowledgement The succession completion of this report would not have been possible without co- operation and support of our professor , friends and our institute. We forward gratitude to respected director of our institute. We are heartily thankful to the management for providing us the opportunity to make a study to practical in their organization. We express our sincere thanks to the company who have given us all the information on-line. We are also thankful our professor out with whose help, this becomes possible and who provided full guidance, co-operation and valuable suggestion bout company report. We are also thankful to our college friends and all those who have helped us directly or indirectly in the preparation of this report. Executive Summary In our project we nave conducted a research on now baJaJ auto ltd works By using stretegic management ; their different moves.. Hence on the basis of the Information we have found out our finding and have done an in-depth analysis on Strategic Management Cycle of Baja] Auto Ltd.. It is followed by recommendations and conclusion. TABLE OF CONTENTS 1 . Objective of SM 2. Introduction of ABC Co. 3. History of ABC co. . Strategic Thinking i. Vision iââ¬â¢. Mission iii. Corporate Purpose ââ¬Ëv. Values: (Standard of Conduct, Law, Employees, Consumers, Shareholders, Business Partners, Community Involvement, Public Activities, the environment, innovation, competition, business integrity etc. ) 5. Strategic Planning i. Strategy adopted by ABC Co. iââ¬â¢. Action plan by ABC Co. iii . Responsibilities of ABC Co. ââ¬â CSR (Internal as well as External) iv . Michael Porters 5 Forces analysis v. McKinseys7S Model VI. SWOT Analysts of ABC co. PEST Analysts ViiiBCG MATRIX 6. Analysis of Strategies of ABC Co 7. Strategic Implementation i. Resource Allocation 7. Strategic Evaluation i . Balance Scorecar 1. OBJECTIVE OF SM . Statements of vision tend to be quite broad and can be described as a goal that represents an inspiring, overarching, and emotionally driven destination. Mission statements, on the other hand, tend to be more specific and address questions concerning the organizationââ¬â¢s reason for being and the basis of its intended competitive advantage in the marketplace. Strategic objectives are used to operationalize the mission statement. That is, they help to provide guidance on how he organization can fulfill or move toward the ââ¬Å"high goalsâ⬠in the goal hierarchy-the mission and vision. As a result, they tend to be more specific and cover a more well- defined time frame. Setting objectives demands a yardstick to measure the fulfillment of the objectives. If an objective lacks specificity or measurability, it is not very useful, simply because there is no way of determining whether it is helping the organization to move toward the organizationââ¬â¢s mission and vision. 2. INTRODUCTION OF BAJAJ GROUP : The Baja] Group is amongst the top 10 business houses in India. I s tootprint stretches over a wide range of industries, spanning automobiles (two-wheelers and three-wheelers), home appliances, lighting, iron and steel, insurance, travel and finance. The groupââ¬â¢s flagship company, Baja] Auto, is ranked as the worldââ¬â¢s fourth largest two- and three- wheeler manufacturer and the Baja] brand is well-known across several countries in Latin America, Africa, Middle East, South and South East Asia. Founded in 1926, at the height of Indiaââ¬â¢s movement for independence from the British, the group has an illustrious history. The integrity, dedication, resourcefulness nd determination to succeed which are characteristic of the group today, are often traced back to its birth during those days of relentless devotion to a common cause. Jamnalal Baja], founder of the group, was a close confidant and disciple of Mahatma Gandhi. In fact, GandhiJi had adopted him as his son. This close relationship and his deep involvement in the independence movement did not leave Jamnalal Baja] with much time to spend on his newly launched business venture. His son, Kamalnayan Baja], then 27, took over the reigns of business in 1942. He too was close to Gandhi]ââ¬â¢ nd it was only after Independence in 1947, that he was able to give his full attention to the business. Kamalnayan Baja] not only consolidated the group, but also diversified into various manufacturing activities. The present Chairman of the group, Rahul Baja], took charge of the business in 1965. Under his leadership, the turnover of the Baja] Auto the flagship company has gone up from INR. 72 million to INR. 120 billion, its product portfolio has expanded and the brand has found a global market. He is one of Indiaââ¬â¢s most distinguished business leaders and internationally espected for his business acumen and entrepreneurial spirit. 3. HlSTORY OF BAJAJ AUTO LTD Baja] Auto is a $2. 3 billion company founded in 1926. It is fourth largest two- and three-wheeler manufacturer. Baja] Auto has three plants in all, two at WaluJ and Chakan in Maharashtra and one plant at Pant Nagar in Uttaranchal. The company is into manutacturing ot motorcycles, scooters and three-wheelers. In India, Baja] Auto has a distribution network of 485 dealers and over 1,600 authorised services centres. It has 171 exclusive dealers for the three-wheeler segment . lt has total 3750 rural outlets in rural areas. The company has opened 11 retail stores for bikes across the country, exclusive for high-end and performance bikes. It has opened these stores under the name in cities like Pune, Nashik, Ahmedabad, Chennai, Hyderabad, Kolkata, Navi Mumbai, Chandigarh, New Delhi, Faridabad and Mangalore. The Baja] brand is well-known across several countries in Latin America, Africa, Middle East, South and South East Asia. It has a distribution network in 50 countries with a dominant presence in Sri Lanka, Colombia, Bangladesh, Mexico, Central America, Peru and Egypt. It has technical tie up with Kawasaki Heavvy Industries of Japan to manufacture latest models in the two-wheeler space. Baja] Auto has launched brands like Boxer, Caliber, Wind125, Pulsar and many more. It has also launched Indiaââ¬â¢s first real cruiser bike, Kawasaki Baja] Eliminator. Baja] Autoââ¬â¢s has in all three plants, two at WaluJ and Chakan in Maharashtra and one plant at Pant Nagar in Uttranchal, western India. WaluJ ââ¬â Baja] range of motorcycles and three-wheelers Chakan ââ¬â Baja] range of motorcycles Pant Nagar ââ¬â Baja] range of motorcycles Achievement 1945- On November 29 Baja] Auto came into existence as BachraJ Trading Corporation Private Limited. 1948- The company commenced sales in India by importing two- and three-wheelers. 1959- Baja] Auto obtained the licence from the Government of India to manufacture two- and three-wheelers. 1960- The company became a public limited company and conducted Bhoomi PooJan of the Akurdi Plant. 1970- Baja] Auto rolled out its 100,000th vehicle. 971- The company introduced its three-wheeler goods carrier. 1972- The company introduced Baja] Chetak. 1975- Baja] Auto ; Maharashtra Scooters entered into a Joint venture. 1976- The company introduced Baja] Super. 977- Baja] Auto introduced rear engine autorickshaw and achieved production and sales of 100,000 vehicles in a single financial year. 1981- Baja] Auto launched Baja] M-50. 1984- On January 19, the foundation stone laid for the new plant at WaluJ, Aurangabad. 1985- On November 5, the WaluJ plant inaugurated by the erstwhile President of India, Giant Zail Singh. The company commenced production at WaluJ, Aurangabad in a record time of 16 months. 1986- The Baja] M-80 and the Kawasaki Baja] KBIOO motorcycles were introduced. The company produced and sold 500,000 vehicles in a single financial year. 990- The Baja] Sunny was introduced. 1991- The company introduced Kawasaki Baja] 4S Champion. 1994- It launched Baja] Classic. 1995- On November 29, Baja] Auto turned into a 50-year old company. It signed agreements with Kubota of Japan for the development of diesel engines for three- wheelers and with Tokyo R;D for ungeared scooter and moped development. The Baja] Super Excel is introduced while Baja] celebrated its ten millionth vehicle. The same year one million vehicles were produced and sold by company in that financial year. 1997- The Kawasaki Baja] Boxer and the RE diesel Autorickshaw are introduced. 998- The company commenced production at Chakan plant. It rolled out Kawasaki Baja] Caliber from its WaluJ plant. Baja] Auto launched Legend, Indiaââ¬â¢s first four- stroke scooter from Akurdi plant. The same year Spirit was launched. 1999- Caliber motorcycle notched up 100,000 sales in record time of 12 months. 000- The company launched Baja] Safire. 2001- Baja] Auto launched its latest offering in the premium bike segment ââ¬ËPulsarââ¬â¢. The same year Eliminator was launched. 2003- Baja] Pulsar DTS-i was launched. The company sold 107,115 motorcycles in a month. The company launched Baja] Wind 25, The World Bike in India. It launched its Caliber 115 ââ¬ËHoodibabaa! ââ¬Ë in the executive motorcycle segment. 2004- B aja] Discover DTS-I, new Baja] Chetak 4-stroke with wonder gear and Baja] CT 100 were launched. Baja] unveiled new brand identity, new symbol, logo and brandline. 005- Baja] Discover, Baja] Avenger DTS-I and Baja] Wave DTS-I were introduced. 2006- Baja] Platina was launched. 2007- RE GDi autonckshaw, Bajaj XCD 125 DTS-Si, Bajaj pulsar 220 DTS-Fi, 200 cc Pulsar DTS-I and Baja] Kristal DTS-i were launched. The company also underwent through revamping of its organisational structure. 008- Baja] Platina 125 DTS-Si was launched. 2009- Bajaj pulsar 150 & 180 upgrade and Bajaj XCD 135 DTS-Si were launched 2011- April, Baja] Records its best year ever of 2010. HISTORY OF RAHUL BAJAJ Rahul Baja] Chairman, Baja] Auto Limited. Mr. Baja] (b. June 10, 38) is recognized as one of the most successful business leaders of India. He heads the Baja] Group of Companies which is a leader in a variety of manufactured products and financial services in India and abroad including motorized 2 and 3-wheelers, home appliances, electric lamps, wind energy, special lloy and stainless steel, cranes, forgings, infrastructure development, material handling equipment, travel, general and life insurance and investment, consumer finance & asset management. Mr. Baja] holds an Honours Degree in Economics from Delhi University, a degree in Law from Bombay University and an MBA from Harvard Business School. Mr. Baja] is the Chairman of the Board of many companies. He was elected to the Upper House of Parliament (RaJya Sabha 2006 ââ¬â 2010). Mr. Baja] has received many prestigious awards and recognitions, notable being the award of ââ¬ËPadma Bhushanââ¬â¢ by he Government of India in 2001, Alumni Achievement Award by the Harvard Business School and Life Time Achievement Awards from Economic Times, Ernst & Young and CNBC TV18. Mr. Baja] was appointed Knight in the Order of the Legion of Honour by the President of the French Republic. Mr. Baja] has been conferred Honorary Doctorates by 7 Universities including IIT Roorkee. The Project Report On Strategic Leaders Page 4 Mr. Baja] was the President of Confederation of Indian Industry (Cll ââ¬â 1979-80/1999-2000). He was President of Society of Indian Automobile Manufacturers SIAM) and Mahratta Chamber of Commerce, Industry And Agriculture (MCCIA) and Chairman of the Development Council for Automobiles and Allied Industries. Mr. Baja] was appointed by the Government of India the Chairman (1986- 89) of the Government owned domestic carrier, Indian Airlines. Mr. Baja] was nominated by the President of India the Chairman of the Board of Governors of the Indian Institute of Technology, Bombay during 2003-06. Mr. Baja] is a Member & former Chairman of the International Business Council of the World Economic Forum, Geneva and a Member of Harvard Business Schoolââ¬â¢s Global Advisory Board. He is also a Member of the International Advisory Council of the Brookings Institution, Washington DC and a Member of the Executive Board of Indian School of Business. Mr. Baja] spear-heads the CSR initiatives of the Baja] Group which include Jamnalal Baja] Foundation and Shiksha Mandal and a number of social organizations including Bharatiya Yuva Shakti Trust and Ruby Hall Clinic, a large hospital in Pune as their Chairman.
Friday, January 3, 2020
Es G And Ehs Management Practices - 1368 Words
In todayââ¬â¢s business matter, numerous perspectives emphasize sustainability. Several environmental, social, and governance issues, including health and safety among other factors, have contributed to the diverse aspects of sustainability. The complex business reforms brought by the Environmental, Health and Safety (EHS), including social and governance (ESG) issues remain indistinctive in several disciplines. Some widespread proposals exist over the application of, ESG and EHS management practices and methods. To understand sustainability, it is essential to discover how it has emerged and maintained a business focus. Sustainable Development In 1987, the term sustainable development was introduced in the World Commission on Environmentâ⬠¦show more contentâ⬠¦Policymakers must consider a new development paradigm because it concerns public welfare. Future generations must be taken into account when creating these developments within the paradigm. Not only should the paradigm consider the interdependence of economic, social, and environmental dimensions, but also human needs must be met without compromising the future generationââ¬â¢s quality of life. One must observe that sustainability, is conceptually a broader interception of environmental, social, and economic issues. In 1989, William Rees, a professor with a creditable Ph.D. in population ecology, suggested that an agreeable universal definition of the concept ââ¬Å"sustainable developmentâ⬠was precondition to developing acceptable policies and plans to support this concept. During the same year, Swedish doctor named Karl-Hendrick Robert, assembled a group of scientists and researchers. Similarly, he believed the term lacked practical sense, thus his mission was to reach a scientifically meaning for it. Subsequently, the research concluded that stainability is the capacity of the human society to continue indefinitely within the cycles of natural environment. A broad connotation on sustainable development created a complex
Subscribe to:
Posts (Atom)