It is critical for the investigator to understand the possible security risks that computer and network users face before conducting computer forensic investigations.
- Use the library, the course textbook, and the Internet to research information about security risks and several security threats that computer and network users face that require a forensic response. Focus on the security risks involved in computing, the goals of secure computing, the threats to security in computing, finally the controls available to address these threats.
- Write a 2 pages report including:
- Atitle page
- An introduction to the contents of the report
- An explanation of the possible security risks involved when conducting computer- and network-based operations
- A list of 5-10possible threats facing computer and network users
- Identification ofat least 4controls available to address security threats
- Asummary of all risks, threats, andcontrols and their importance to the computer forensic investigators knowledge base
- Be sure to reference all sources in APA format. For more information on APA, please visit the APA Lab.
- Click Here To Get More on This Topic......
No comments:
Post a Comment