IT Forensics: Two Case Studies on Internal and External Threats