Select ONE type of incident from the list below. Using the internet or online library, find an article, case study, or publication about computer forensics that addresses the specific incident type.
Summarize your findings. Be sure to provide a link to the article, case study, or publication.
- Loss of data or information
- Intellectual property theft
- Unauthorized disclosure of data or information
- Phone phreaking
- Email abuse
- Inappropriate network abuse
- Computer break-ins
- Sexual harassment
- Disclosure of confidential information