definition on permissions and security in a corporate systems. Evidence collection
techniques are useful in large fraud cases; their associated software houses large sets of
documents, data, and other information in fraud investigations. Finally, deep forensics
topics such as encryption cracking and intrusion detection are better suited to computer
science journals. The aforementioned topics are beyond the scope of this paper and are
not included.