Page 133 - CFF
P. 133
Network forensic analysis
• Alternative sources for data recovery
– Consider backup drives
– Cloud drives
– Email messages
– Printouts
• Identifying network outsiders
– The IP address of outsiders can be found through web server logs and
email headers
– IP addresses uniquely point to a computer or network device
– One or more subpoenas may be required to trace an IP address to the
end user
9 © 2019 Association of International Certified Professional Accountants. All rights reserved.