Jonathan Simpson owns a construction company. One day a subcontractor calls him, saying that he needs a replacement check for th
e job he completed at 1437 West Maple Avenue. Jonathan looks up the job on his accounting program and agrees to reissue the check for $12,750." The subcontractor says that the original check was for only $10,750. Jonathan looks around the office but can't find the company checkbook or ledger. Only one other person has access to the accounting program. Jonathan calls you to investigate. How would you proceed? Write a one-page report detailing the steps Jonathan needs to take to gather the necessary evidence and protect his company.
A construction company is owned by Mr. Jonathan Simpson A subcontractor was working with him and when he has completed the work he was paid $10,750 but the actual payment was $ 12.750. But after short time the contractor contacted the owner of the company to pay him the replacement check, When the owner checked his accounting system he found something wrong is happening in the company’s account system. The owner knows that only one person other that can access the account. So he wants to collect the evidences against the employee. The first aim should be to hire the forensic
investigator from the investigating company to collect the evidences against him. Computer forensics Computer forensics involves the digital evidence in support of crime, or administrative cases to be used as evidence. The evidence obtained should be legal. authentic, and admissible. It is different from data recovery, work forensics and disaster recovery in many aspects. In computer forensic we search for an unknown data which was hidden by the suspect or user which can be used as a valid proof against the suspect.
Chain of custody is the chronological documentation that records the sequence of custody,and disposition of electronic or physical evidence. It is important because it can be used during a criminal court trial.