What is required to conduct an investigation involving e-mail abuse?

What will be an ideal response?


ANSWER: The following list is what you need for an investigation involving e-mail abuse:
* An electronic copy of the offending e-mail that contains message header data; consult with your e-mail server administrator
* If available, e-mail server log records; consult with your e-mail server administrator to see whether they are available
* For e-mail systems that store users’ messages on a central server, access to the server; consult with your e-mail server administrator
* For e-mail systems that store users’ messages on a computer as an Outlook .pst or .ost file, for example, access to the computer so that you can perform a forensic analysis on it
* Your preferred computer forensics analysis tool, such as Forensic Toolkit or ProDiscover

Computer Science & Information Technology

You might also like to view...

Draw a hat on someone in a picture.

What will be an ideal response?

Computer Science & Information Technology

To create an InputStream to read from a file on a Web server, you use the method __________ in the URL class.

a. getInputStream(); b. obtainInputStream(); c. openStream(); d. connectStream();

Computer Science & Information Technology

_____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.

A. Accessibility B. Relationship C. Feasibility D. Performance

Computer Science & Information Technology

Writing code so that an operator can be used with variables of programmer defined types is called __________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology