Assume a computer at work has been used to steal credit card information from clients. An employee you work with has been suspected of committing the crime but does not yet know that they are a suspect.
The computers you work with are part of a larger company network.
As a Computer Forensics Investigator you have been tasked with locating evidence of these crimes on this employee's computer, as the computer is company property there are no expectations of privacy.
Q 1: How can you acquire the digital evidence from the computer?
Q 2: Which methods of collection would you use and why?
Q 3: Would you use any special tools, programs, or methods?
Can you get the digital evidence from the computer?