The document summarizes a presentation on integrating systems analysis into corporate high technology investigations. It discusses how systems analysis concepts and tools used in IT systems can be applied to investigations. This includes preliminary investigation, analysis of evidence, developing investigation plans and reports, and presenting findings to management and law enforcement. The goal is to build bridges between corporate security and law enforcement in complex electronic investigations.
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Corporate Public Investigations
1. Corporate High Technology Investigations building bridges between Corporate Security and Law Enforcement Presented by Computer Technology Investigators Northwest Presentation Prepared By Christopher Steuart, The Boeing Company Bill Nelson, The Boeing Company Brian Palmer, King County Sheriff’s Office
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35. 1. Start preliminary investigation ID crime 2. Evaluate crime 3. What needs to be done? 4. Draft report Go to 55 55. Start systems analysis 56. 56.1 list items needed 56.2 get items needed 56.3 imple- ment items 57. Brian- storm 58. 71. Select analysis Notify manage- ment Review initial findings Review planning Establish commun- cations methods PERT CHART
39. HiTech, Inc. Intranet Internet WWW, Email, etc. HiTech Proxy Servers HiTech Firewall Seattle So. CA. St. Louis Phil. Coco Beach Users Users Users Users Users Users Mesa Witchita HiTech, Inc. Intranet and Internet T3 line
40. HiTech Intranet Internet WWW, Email, etc. HiTech Proxy Servers * HiTech Firewall Suspect Users here IP:111.222.333.444 Realtime Internet Monitor Process Investigation Proxy Server - suspect Internet data is collected here. Both sent & received data is collected as it occurs. Normal access flow * Utility called Proxy.Pac is updated to tell the Network to sendsuspects Internet activity to Investigation Proxy Server. (http://proxy-support.boeing.com:31060/proxy.pac) Suspect is automatically rerouted to Investigation Proxy Server. to the Internet T3 line