Why is the investigation of computer crime involving malicious damage especially chall
A.Information stored in a computer is intangible evidenc
B.Evidence may be destroyed in an attempt to restore the system.
C.Isolating criminal activity in a detailed audit log is difficult.
D.Reports resulting from common user error often obscure the actual violation.