Response to an Incident Involving a Computer: What Do You Do?

Prepare a 1,050- to 1,500-word paper that discusses research-based interventions to treat psychopathology.
July 30, 2020
What makes one person respond to a fearful situation negatively and what makes them respond positively?
July 30, 2020

Response to an Incident Involving a Computer: What Do You Do?

Assignment 2: LASA 1: Response to an Incident Involving a Computer: What Do You Do?As the security representative for Computers, Security, and Investigations Inc. (CSII) in Centervale, you are the first responder to an emergency telephone call reporting that someone inside the computer lab may have been accessing child pornography. The security policy requires that you, as the first responder, investigate and document incidents fully.As the first responder, you notify your immediate supervisor and close the lab for the rest of the day. Your supervisor, the chief security officer (CSO), requests a 6- to 8-page comprehensive report that details the situation and your actions as the first responder. You also consider contacting the director of the information technology (IT) department and the local authorities.You are a security professional and not a law enforcement officer. You realize, however, that your work as the first responder is important for corporate responsibilities and further legal considerations. You are aware that your documentation could greatly affect the corporate policies and the prosecution of the individual.What considerations will your documentation present for the corporation? What considerations will your documentation present for law enforcement? Please itemize how this can affect both entities.Situational Information:Each person that enters the library must sign in and sign out of the computer lab in the library.
Each persons identification is not verified by anyone.
There are no cameras in the computer lab, but there are cameras at the main entries and exits of the building.
Several potential witnesses were within the lab when the computers worked, and then suddenly stopped working.
No one touched the computer since the individual left the laboratory.
Several of the witnesses can identify the individual but not by nameblue jeans, a white T-shirt, black sneakers, a short haircut, no facial hair, and Caucasian male.
A thumb drive was left in the computer by the suspect, but the librarian touched the thumb drive.