Describe some of the forensic processes involved in investigating an employee suspected of industrial espionage. 

What will be an ideal response?

Before initiating this type of investigation, make sure the company, whether it's a private organization or a public agency, has set up rules of use and limitations of privacy rights. For these investigations, you might need to set up a surveillance camera to monitor the employee's activities in the office. You might also need to plant a software or hardware keylogger (for capturing keystrokes remotely), and you need to engage the network administrator's services to monitor Internet and network activities. In this situation, you might want to do a remote acquisition of the employee's drive, and then use another tool to determine what peripheral devices have been accessed. 

Computer Science & Information Technology

You might also like to view...

Before you can use Skype to communicate with someone, you must ________

A) type the person's name in the Message box B) add the person to your contacts C) make sure the person is online D) first call the person from your mobile device

Computer Science & Information Technology

Which of the following statements is false?

a. Lists and tuples are built-in sequence collections. b. Dictionaries, strings and sets are built-in non-sequence collections. c. A dictionary is an unordered collection which stores key–value pairs that map immutable keys to values, just as a conventional dictionary maps words to definitions. d. A set is an unordered collection of unique immutable elements.

Computer Science & Information Technology