Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Assume a computer at work has been used to steal credit card information from cl

ID: 3550906 • Letter: A

Question

Assume a computer at work has been used to steal credit card information from clients. An employee you work with has been suspected of committing the crime but does not yet know that they are a suspect.  The computers you work with are part of a larger company network.  As a Computer Forensics Investigator you have been tasked with locating evidence of these crimes on this employee's computer, as the computer is company property there are no expectations of privacy.

How can you acquire the digital evidence from the computer? Which methods of collection would you use and why? Would you use any special tools, progams, or methods?

Explanation / Answer

1. Find the MAC address of the suspected system and compare it with the MAX address of the system that commited the crime.


2. If the crime is a cyber crime, find out the IP address of the crime performing computer and compare.


3. Check the browser history and look for information.


4. Use programs like keylogger to monitor keyboard activity

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote