Amanager suspects that one of his team members has been fraudulently accessing confidential and sensitive information and breaching data integrity. which technology would the manager look into the activities of the team member? technology would be useful to look into the activities of the team member.
The answer is computer forensics
Digital computer forensics teams are experts who can help unravel and put together any evidence and come into terms with a scope of a breach. Computer Forensics technology use various investigations and analysis techniques to gather and preserve evidence. Such evidence, if found, will be presented in a court of law if the manager finds one of his team members culpable.