ESSENCE OF THE CASE
You work in the IT department for a large pharmaceutical company and are the security investigator for computer incidents. You have received a call from a manager who suspects an employee of accessing highly sensitive documents and possibly copying them. You have been asked to investigate this possibility.
Several incidents have occurred recently to raise the suspicion of the manager of the suspected employee. On several occasions, the manager has observed ...