Insider file deletion is a threat to cyber security since it is carried out by trusted people who understand the vulnerabilities of systems (Chan et al., 2012). The key to tackling this deletion is tracing it back to the perpetrator. It is advised that system administrators should move with speed to identify those responsible for the deletion (Chan et al., 2012). Social media data could provide insights which can be used to identify the responsible party. Suppose that the perpetrator used credentials that can be linked to their social media account. An investigator can exploit this link to identify the perpetrator. Investigators can also rely on network logs to identify incidences of insider file deletion. These logs serve as records of activities carried out on a
Insider file deletion is a threat to cyber security since it is carried out by trusted people who understand the vulnerabilities of systems (Chan et al., 2012). The key to tackling this deletion is tracing it back to the perpetrator. It is advised that system administrators should move with speed to identify those responsible for the deletion (Chan et al., 2012). Social media data could provide insights which can be used to identify the responsible party. Suppose that the perpetrator used credentials that can be linked to their social media account. An investigator can exploit this link to identify the perpetrator. Investigators can also rely on network logs to identify incidences of insider file deletion. These logs serve as records of activities carried out on a