1. Needs for the DF investigation — why did you bring in the investigator?
2. The forensic process you want followed, including data collection (detail possible sources of data), examination, analysis, and reporting.
3. List and describe the type(s) of information and it’s relevance to this case from each of the following: data and data files, Operating Systems (Windows 10, WIN Server ’12, and Ubuntu Linux), network traffic, applications, and eMail and services.
*include all resources used as well as referencing the TJX and Heartland cases

Leave a Reply

Your email address will not be published. Required fields are marked *