The end result of computer forensics is to perform a


1: There were many methods of safety described in chapter 11, some methods of safety were new to me and some methods of safety were methods I try my best to implement into protecting my own personal information. The fencing technique mentioned in chapter 10 and 11 is something I do with my laptops and phone. There are certain things that are accessible by a guest user on my devices and the rest are fenced off for restrictions. I do use the lock method either by pin number, password, and fingerprint to help with security also. I have so many passwords and pin numbers that I have made a list and secured the list itself for protection. I do need to develop an escape plan and drill for safety.

2: Computer forensics also called cyber forensics is a type of investigation and analysis techniques to gather and preserve evidence from a particular computer or device in a way so it can be used for presentation in a court of law. The end result of computer forensics is to perform a structured investigation while also maintaining a well-documented chain of evidence to find out what really happened on a computing device and who was responsible for it.

3: Jezreel, great post and great suggestions!!! Not everyone knows how to protect themselves from a disaster!! And "hurricane Sandy" is a great example of how people were not prepared, good job. Jezreel and class, at your place of employment, do you know if they have a disaster plan and how about your homes? Please share.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: The end result of computer forensics is to perform a
Reference No:- TGS01416130

Now Priced at $20 (50% Discount)

Recommended (98%)

Rated (4.3/5)