Identification of at least controls


It is critical for the investigator to understand the possible security risks that computer and network users face before conducting computer forensic investigations. 

  • Use the library, the course textbook, and the Internet to research information about security risks and several security threats that computer and network users face that require a forensic response. Focus on the security risks involved in computing, the goals of secure computing, the threats to security in computing, finally the controls available to address these threats.
  • Write a 1-2 page report including:
    • A title page
    • An introduction to the contents of the report
    • An explanation of the possible security risks involved when conducting computer- and network-based operations
    • A list of 5-10 possible threats facing computer and network users
    • Identification of at least 4 controls available to address security threats
    • A summary of all risks, threats, and controls and their importance to the computer forensic investigator's knowledge base
    • Be sure to reference all sources in APA format. For more information on APA, please visit the APA Lab.

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Identification of at least controls
Reference No:- TGS0530583

Expected delivery within 24 Hours