case 3 41

case 3 41 - Case Response 3 Case # 41 Case Response 3...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Case Response 3 Case # 41 Case Response 3 Case # 41 Michelle Knight Strayer University Forensic Accounting – ACC C 571 Nauri D. Ahmed February 12, 2011
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Case Response 3 Case # 41 Computer forensics is when computer techniques are used to assist in a variety of investigations. Forensics is the process of using scientific knowledge collecting and analyzing data from computer networks, wireless communications and the computer storage system in a way that is permitted to use as evidence in a court of law. Computer forensics is as discipline that combines parts and elements of law and computer science. A company should practice computer forensics because it will help the overall integrity and survivability of a company’s network infrastructure. (Us Cert. Gov, 2008) It is believed that Betty Beanco has hacked into the companies accounting system to create phony customer accounts, and in order to do so she would have had to use one of the company’s computers. If there were any criminal evidence against Betty Beanco a search
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/16/2012 for the course ACC 571 taught by Professor Wills during the Spring '09 term at Strayer.

Page1 / 4

case 3 41 - Case Response 3 Case # 41 Case Response 3...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online