computer forensics;answer the “5 W’s.” Explain what you found, how you found it, and who the culprit is, Questions to answer: Is Jo the owner of these files? What evidence is there to confirm or reject this? How did the computer come to be sold on

 

answer the “5 W’s.”  Explain what you found, how you found it, and who the culprit is,

 

Questions to answer:

    • Is Jo the owner of these files? What evidence is there to confirm or reject this?
    • How did the computer come to be sold on the secondary market?
    • Who (if anyone) was involved in the sale (theft?) of the computer?
    • Were any attempts made to hide these activities?
    • Is Jo responsible for the files found on the purchased machine? What evidence is there to support this?
    • How did this machine get onto the secondary market?
    • Who (if anyone) from the company is responsible for the sale of the machine?
    • Are there any other suspicious activities occurring within M57?

 

You are tasked with determining the following:

     
Who is exfiltrating the data?

     
How are they doing it? Can you identify the specific items they have stolen? What is required to access the data?

     
Who is the outside contact?

     
Is there anything in your analysis to suggest that this person might be charged with more than one criminal offense?

 

You are tasked with determining the following:

     
Who is spying on Pat?

     
How are they doing it? Can you identify specific methods or software they have used to facilitate this?

     
Why is the employee spying on Pat?

     
Is anyone else involved? Would you characterize them as accomplices?