Question 5
You are presented with a case where a suspect attempted to hide picture files about child
pornography on his computer system.
Your initial investigation points to the fact that
the suspect hid the malicious picture files under an NTFSWindows system.
a. Draw a plan describing the steps you would take in carrying out this investigation.
[10]
b. Describe the places where you would search for these files and describe how you
would recover the files.
[10]
Question 6
Justina (not her real name), an employee of PWD cc a local catering company is suspected of
stealing the company's receipt; of preparing snack with a Namibian twist. It is suspected that
she is communicating with an employee from a competing company via emails and instant
messaging while at the company premises. You have been approached to investigate this
case and you have been instructed to handle the investigation in a proper manner.
a. Detail how you would initiate the acquisition of evidence for the investigation. [4]
b. Draft a plan as to where and how you might get email evidence for this case. [10]
c. Detail how Agnes can cover up the trails of email and how you can still recover the
emails if possible.
[6]
Page I 2