see attachment
By now, you should understand the steps involved in computer forensics
investigation. Take an example of any company to discuss the various
consequences of breach of investigation duty. Respond to an intrusion and
discuss how any breach of investigation duty disrupts the normal business of a
company—costly at best and totally destructive in the worst case.