Reference no: EM133666012
Assignment:
The collection of system forensics evidence is governed by the general rules of criminal evidence. As such, it is subject to a number of well-established and formal steps. As a pervasive form of communication and commerce, e-mail also presents many opportunities to facilitate criminal activities.
1. You have been hired to help investigate a computer crime. Respond to the questions given using the scenario below.
This is a classic phishing attempt. Mark received an e-mail plea asking for his assistance in retrieving funds from a foreign bank. He provided personal information to help with the transaction. Within a week, he noticed that his bank account was plummeting. He had been phished!
a. How would you proceed with your investigation? Explain what steps you would take to examine the e-mail messages.
b. Analyze the information that might be useful to your investigation from looking at the headers of the e-mail messages.
2. Innovation Technologies, a cloud data storage provider, wants to send a mass e-mail message to former customers announcing that, it now offers managed IT services. That means Innovation Technologies can remotely monitor and manage a client's virtual computers and servers 24/7. Discuss the stipulations of the CAN-SPAM Act. What must Innovation Technologies do to adhere to the act?