Discussion 1 Topic: Computer Forensics Basics For this assignment, you must crea

Place your order now for a similar assignment and have exceptional work written by our team of experts, At affordable rates

For This or a Similar Paper Click To Order Now

Discussion 1 Topic: Computer Forensics Basics For this assignment, you must create an original post addressing the questions below, preferably prior to Wednesday. Question: Select ONE type of incident from the list below. Using the internet or online library, find an article, case study, or publication about computer forensics that addresses the specific incident type. Summarize your findings. Be sure to provide a link to the article, case study, or publication. 1. Loss of data or information 2. Intellectual property theft 3. Unauthorized disclosure of data or information 4. Phone phreaking 5. Email abuse 6. Inappropriate network abuse 7. Computer break-ins 8. Sexual harassment 9. Disclosure of confidential information Note: 500 words Three or more References Two or more citations Discussion 2 For this assignment, you must create an original post addressing the questions below, preferably prior on Wednesday. Question: Open a web browser and go to the CERT Website (https://www.cisa.gov/uscert/) and review the currently active technology threats. Summarize your findings and describe how a security department can use these alerts. Note: 500 words Three or more References Two or more citations Discussion 3 For this assignment, you must create an original post addressing the questions below, preferably prior on Wednesday. Question: Create an investigative toolkit. What tools would you have in your toolkit? Document the following: * the features of each tool * how much does each tool cost (if applicable) * advantages/disadvantages Note: 500 words Three or more References Two or more citations Discussion 4 For this assignment, you must create an original post addressing the questions below, preferably prior to Wednesday. Question: Select ONE type of corporate case from the list below. Using the internet or online library, find an article, case study, or publication about computer forensics that addresses the specific incident type. Replying to this posting, summarize your findings in at least 300 words. Be sure to provide a link to the article, case study, or publication. 1) Corporate espionage 2) Employee e-mail abuse 3) Employee Internet abuse 4) Misuse of company resources 5) Security and computer policy violations 6) Unauthorized disclosure of corporate information and data Note: 500 words Three or more References Two or more citations

For This or a Similar Paper Click To Order Now