77.6k views
1 vote
What is required to conduct an investigation involving internet abuse?

User Jay Shin
by
7.7k points

1 Answer

1 vote
-organization's internet proxy server logs
- suspect computer's IP address
- suspect computer's disk drive
- your preferred computer forensics analysis tool
User Lukart
by
7.8k points