Examining suspicious email
Part 1: Examine the Suspicious Email.txt File
You are an investigator at a major U.S.-based bank, and one of your duties is to monitor outgoing employee emails. The main objective of this monitoring effort is to catch any customer data (such as a Social Security Number [123-45-6789] or email addresses) being removed, which is against company policy.
During your monitoring operations, you find an employee that appears to be emailing a large book, and you decide to give this file further inspection. However, the book appears to be over 48,000 lines of text, and you cannot read each line.
Complete the following steps:
Submit all of your searches, the results (even if the search did not yield interesting results), and how you tested to ensure your search was formed or formatted correctly.
Part 2: Examine the Practical Suspicious Email Bonus.csv File
Once again, you are the investigator at the same U.S.-based bank. Your findings from the first monitoring effort have you very concerned, and you have decided to open a case on your subject employee. The next file you have under review is very different from the first, as it contains what appears to be a series of random numbers. Note that the file seems to be very large.
Based on findings from the first file:
Show the results of your interesting findings and recommend further searches on other data based on your results.
Select your paper details and see how much our professional writing services will cost.
Our custom human-written papers from top essay writers are always free from plagiarism.
Your data and payment info stay secured every time you get our help from an essay writer.
Your money is safe with us. If your plans change, you can get it sent back to your card.
We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.
Get instant answers to the questions that students ask most often.
See full FAQ