computer-forensics-and-email-investigations
- You are investigation an e-mail harassment case. Would you suggest collecting evidence for the case be handled by internal corporate investigations or by an outside criminal investigation organization? Provide reasons for your selection.
- Select one of the “specialized†e-mail recovery tools listed in chapter 11 and describe the tools attributes and how the tool is used to recovery e-mail evidence. (tools are: DataNumen, FINALeMAIL, DBXextract, AccessData FTK, Ontrack easy recovery email repair, or R-tools R-mail)
- Discuss the advantages and disadvantages of using circular logging verse continuous logging.