77.6k views
1 vote
What is required to conduct an investigation involving internet abuse?

User Jay Shin
by
8.2k points

1 Answer

1 vote
-organization's internet proxy server logs
- suspect computer's IP address
- suspect computer's disk drive
- your preferred computer forensics analysis tool
User Lukart
by
8.2k points

No related questions found

Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.