In this scenario, there appears to be a situation involving check fraud and possibly embezzlement. The $12,750 check appears to have been falsely created; this could have happened for two reasons: the person who created the check could have kept the extra $2000 from the original $10,750 check […]
In this scenario, I am going to assume that the inappropriate content was pornography. To collect the information we require, we must track the employee’s movement to and from the building (if possible), which computers she used and where/when, what credentials she used, what was the full […]
Numerous computer forensic tools help in the process of backing-up data, such as disk imaging software; with this software, the data on hard drives can be traced, and there are several different types of disk imaging software currently available. Data capture can be done with FTK Imager or […]
You must be logged in to post a comment.