Page 133 - CFF
P. 133

Network forensic analysis






         • Alternative sources for data recovery


            – Consider backup drives

            – Cloud drives

            – Email messages

            – Printouts

         • Identifying network outsiders


            – The IP address of outsiders can be found through web server logs and
                email headers

            – IP addresses uniquely point to a computer or network device
            – One or more subpoenas may be required to trace an IP address to the

                end user



         9    © 2019 Association of International Certified Professional Accountants. All rights reserved.
   128   129   130   131   132   133   134   135   136   137   138