evidence will be collated via the CISO , It will concentrate on following information: 1-list of affected customers including information about their computers: IP address, operating System version, Anti Virus software , Security software , type of computer personal or pubic . 2-list of fraudulent funds transfers including details about banks inside and outside US ,IP address of the source who made the transfer , Dates and times . VL Bank’s lawyer and will concentrate on this information, which…
Words 2748 - Pages 11