Suppose there has been an incident at your organization that will require a forensic investigation of company computers and e-mail. You have been asked by the head of your organization to prepare a presentation for the non-technical staff that explains how e-mail works, and the types of information that forensic e-mail investigations attempt to uncover.
Consider the following when creating your presentation: