When a cyber crime happens, cyber security investigators will look through anti-virus logs, monitoring logs, the operating system, file system listings and other locations within the network and end points.
Cyber security crime investigations, needs, background and requirements for cyber security researchers to assist law enforcement, and for corporate cyber security risk managers to investigate cyber crimes.