Supporting evidence and information can be gained through grassroots investigative techniques.
Expanding computer forensics investigative techniques helps mitigate the “hacker did it” defense.
Computer forensics investigators who are interviewing subjects may need to be licensed as private investigators, depending on the state.
The Reid Technique focuses on preparing for the interview and employing nine steps in the interview process.
Users should be represented on IT security policy review teams.
Policy review should support goals of preservation, authentication, and extraction of data for evidence.
One common issue relating to data retention and employee turnover is that often the misconduct of the terminated employee is not discovered until ...