What is required to conduct an investigation involving Internet abuse?

What will be an ideal response?


ANSWER: To conduct an investigation involving Internet abuse, you need the following:
* The organization’s Internet proxy server logs
* Suspect computer’s IP address obtained from your organization’s network administrator
* Suspect computer’s disk drive
* Your preferred computer forensics analysis tool (ProDiscover, FTK, EnCase, X-Ways Forensics, and so forth)

Computer Science & Information Technology

You might also like to view...

What items should an organization consider when deciding whether to employ in-house investigatory expertise?

What will be an ideal response?

Computer Science & Information Technology

Liquid crystals used in monitors are not poisonous

Indicate whether the statement is true or false

Computer Science & Information Technology

The maximum line width for a picture border is 6 points.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

JPEG stands for Joint Photographic Experts Group.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology