Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

MN624

Read the enclosed case studies below and discuss following points:

Case 1

A lawyer in a law firm is suspected of embezzling money from a trust account. Who should conduct the
investigation? If evidence is found to support the claim, what should be done? Explain the steps to take,
who is involved, and what items must be considered.
A digital forensic expect should conduct investigation. If evidence is found, make sure that the evidence is
admissible in the court as a proof of crime. The items considered as the digital devices such as computer,
laptops, mobiles, and USB devices.

Case 2

A private corporation suspects an employee is using password-cracking tools to gain access to other
accounts. The accounts include employees in the Payroll and Human Resources departments. Write a two-
to-three page paper outlining what steps to take, who should be involved, and what should be considered.

Authorized digital forensic investigator is needed to investigate the employee after obtaining all the
warrants required. The network administrator can help as he can access the network and obtain time of
login in the accounts and employeed involved.

Case 3

An employee is suspected of operating his llama business with a company computer. It’s been alleged that
he’s tracking the sales price of the wool and the cost of feed and upkeep on spreadsheets. What should the
employer do? Write at least two pages explaining the tasks an investigator should perform.
If it has been severely affecting the business hire an investigator to track the ip addresses of the system and
track how often that ip address is accessing particular website. Warn the employee of wrongdoing. If
ignored and same situation happens again can fire the employee in violation of company policy of not using
company resources for personal gain.

Prepared by: Dr Ammar Alazab Moderated by July 2019

You might also like