Consider your computer system used in the Week 1 Assignment. Pretend that while

Consider your computer system used in the Week 1 Assignment. Pretend that while completing the assignments you noticed the dates and times when some files were accessed which appear suspicious or it could be emails that are in your sent mailbox that you did not send. What can you do to identify if your system has been hacked? What can you do to stop it? Offer specific advice for a given operating system and problem. Provide specific steps one can take to identify if their system has been compromised. Cite all sources. Do not repeat situations already posted to this forum.
Additional Resources
Garn, D. M. (2021). Using a troubleshooting methodology for more efficient IT support. CompTIA. Retrieved from https://www.comptia.org/blog/troubleshooting-methodology