Question: Explore Computer Forensics Investigations
As a network technician, you'll be better prepared to spot security compromises if you're already familiar with issues that have affected other networks in the past. In this project, you research three computer forensics investigations.
Complete the following steps:
1. Using a search engine, find articles, blogs, or videos discussing three different computer forensics cases. Identifying information might have been changed to protect privacy, but be sure the cases are actual cases, not just theoretical ones. Document your source or sources for each case. 2. Answer the following questions for each case:
• How was the problem discovered?
• What clues initiated the investigation?
• What crime was committed or suspected?
• What evidence was collected using computer forensics?
• Were there any significant mistakes made in collecting this evidence?
• What was the final outcome of the case?