You’re investigating a case involving an employee who’s allegedly sent inappropriate photos via email in attachments that have been compressed with a zip utility. As you examine the employee’s hard disk, you find a file named Xyz.zip, which you suspect is a graphics file. When you try to open the file in an image viewer, a message is displayed indicating that the file is corrupt. In addition, you find some files with unfamiliar extensions and password‐protected files. Answer the following questions based on this scenario.
Explain how to trace, recover, and analyse e‐mail messages. (2.5 Marks)