Discussion Questions from the book "A Guide to Computer Forensics and Investigations" 3rd Edition
1. Discuss some of the various backup tools available in the market. What are the differences among the computer forensic tools?
2. Analyze and discuss a case where Company A claims its network was compromised by a connection from Company B network. How should both companies proceed? Who should be involved?
3. Discuss the advantages and disadvantages of using ISO standards for testing and validation purposes. The discussion should be oriented but not limited to ISO standards. Any other standard definition can be used.
4. Is it easier to perform a computer forensic investigation if the suspectâ??s computer is a Linux or UNIX system instead of Windows? Does the OS affect the process at all? Consider all flavors of Linux/UNIX and Windows.
5. Debate the legal validity of honeynets. Do you think it is legal or illegal and why?
6. Discuss the advantages and disadvantages of using reports generated by forensics tools to create your final investigation report.