Case Project 3-4A A bank has hired your firm to investigate employee fraud. The bank uses four 20 TB machines on a LAN. You’re permitted to talk to the network administrator, who is familiar with where the data is stored. What diplomatic strategies should you use? Which acquisition […]
In this scenario, there appears to be a situation involving check fraud and possibly embezzlement. The $12,750 check appears to have been falsely created; this could have happened for two reasons: the person who created the check could have kept the extra $2000 from the original $10,750 check […]
In this scenario, I am going to assume that the inappropriate content was pornography. To collect the information we require, we must track the employee’s movement to and from the building (if possible), which computers she used and where/when, what credentials she used, what was the full […]
You must be logged in to post a comment.