internal and external to a corporation, i.e. fraudsters or hackers respectively. There are several different preventative measures employed by security experts to combat such deleterious events. Forensic investigators can use several methods to discover data residing in a computer system, and recover deleted, encrypted, or damaged file information, preserve it, analyze it and present it in a court of law[2]. There is also a growing preference to detecting and tracing attacks pre-emptively. Forensic experts must analyse clues left behind from a breach and use investigative techniques to identify who is responsible[3].
internal and external to a corporation, i.e. fraudsters or hackers respectively. There are several different preventative measures employed by security experts to combat such deleterious events. Forensic investigators can use several methods to discover data residing in a computer system, and recover deleted, encrypted, or damaged file information, preserve it, analyze it and present it in a court of law[2]. There is also a growing preference to detecting and tracing attacks pre-emptively. Forensic experts must analyse clues left behind from a breach and use investigative techniques to identify who is responsible[3].