Explicate the tools you would use for this investigation based on the potential evidence the company security director has already identified , as well as any other potential sources of evidence you might review .
Describe the procedure and tool ( s ) you would consider utilizing for acquiring potential evidence from the CFO ’ s mobile device .
Use at least five ( 5 ) quality resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources .
Your assignment must follow these formatting requirements :
Be typed , double spaced , using Times New Roman font ( size 12 ), with one-inch margins on all sides ; citations and references must follow APA or school-specific format . Check with your professor for any additional instructions .
Include a cover page containing the title of the assignment , the student ’ s name , the professor ’ s name , the course title , and the date . The cover page and the reference page are not included in the required assignment page length .
The specific course learning outcomes associated with this assignment are :
Describe and analyze practices in obtaining digital evidence . Compare and contrast the various types of computer forensic tools .
Demonstrate the ability to develop procedural techniques in crime and incident scenes .
Describe processes in recovering graphic , mobile , and email files .
Develop a computer forensics plan that addresses and solves a proposed business problem .