Question
The collection of system forensics evidence is governed by the general rules of criminal evidence. As such, it is subject to a number of well-established
The collection of system forensics evidence is governed by the general rules of criminal evidence. As such, it is subject to a number of well-established and formal steps. As a pervasive form of communication and commerce, e-mail also presents many opportunities to facilitate criminal activities.
1.You have been hired to help investigate a computer crime. Respond to the questions given using the scenario below.
This is a classic phishing attempt. Mark received an e-mail plea asking for his assistance in retrieving funds from aforeign bank. He provided personal information to help with the transaction. Within a week, he noticed that his bank account was plummeting. He had been phished!
a. How would you proceed with your investigation? Explain what steps you would take to examine the e-mail messages.
b. Analyze the information that might be useful to your investigation from looking at the headers of the e-mail messages.
2. Innovation Technologies, a cloud data storage provider, wants to send a mass e-mail message to former customers announcing that, it now offers managed IT services. That means Innovation Technologies can remotely monitor and manage a client's virtual computers and servers 24/7. Discuss the stipulations of the CAN-SPAM Act. What must Innovation Technologies do to adhere to the act?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started