In 6-8 pages, complete the following:
Describe the impact of access control methods and models in obtaining evidence of sufficient quality to be accepted by a court.
Describe the challenges of engaging in an investigation of potential criminal activity while protecting the due-process rights of the potential suspect.
Examine the options available to an information security professional when executives choose not to report potential computer-based criminal activity.
Evaluate the skills and experience levels desirable in a forensics professional who will be required to testify as an expert witness as part of his or her work.
Discuss the potential strategies for managing encrypted information as part of a forensics investigation.
Discus how the existing technical and procedural controls presented in the case study support the ability to conduct an effective investigation.