Assume a computer at work has been used to steal credit card information from cl
ID: 3550906 • Letter: A
Question
Assume a computer at work has been used to steal credit card information from clients. An employee you work with has been suspected of committing the crime but does not yet know that they are a suspect. The computers you work with are part of a larger company network. As a Computer Forensics Investigator you have been tasked with locating evidence of these crimes on this employee's computer, as the computer is company property there are no expectations of privacy.
How can you acquire the digital evidence from the computer? Which methods of collection would you use and why? Would you use any special tools, progams, or methods?
Explanation / Answer
1. Find the MAC address of the suspected system and compare it with the MAX address of the system that commited the crime.
2. If the crime is a cyber crime, find out the IP address of the crime performing computer and compare.
3. Check the browser history and look for information.
4. Use programs like keylogger to monitor keyboard activity
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.