What is required to conduct an investigation involving Internet abuse?
What will be an ideal response?
ANSWER: To conduct an investigation involving Internet abuse, you need the following:
* The organization’s Internet proxy server logs
* Suspect computer’s IP address obtained from your organization’s network administrator
* Suspect computer’s disk drive
* Your preferred computer forensics analysis tool (ProDiscover, FTK, EnCase, X-Ways Forensics, and so forth)
You might also like to view...
What items should an organization consider when deciding whether to employ in-house investigatory expertise?
What will be an ideal response?
Liquid crystals used in monitors are not poisonous
Indicate whether the statement is true or false
The maximum line width for a picture border is 6 points.
Answer the following statement true (T) or false (F)
JPEG stands for Joint Photographic Experts Group.
Answer the following statement true (T) or false (F)