Computer Crime and Forensic Analysis
Provide two examples to distinguish the difference between what is considered a computer crime and what is not. Hypothesize why a person may commit a computer crime.
Evaluate computer forensic analysis procedures and techniques, and describe a forensic analysis methodology you would conduct when a forensic case had been reported.
Incident Response and Compliances
Give an example of a recent well-known security incident and suggest the incident response procedures that the organization followed or should have followed to mitigate risk in regard to the example cited.
From the e-Activity, decide if legislation and regulations have had the intended impact on the legal and ethical issues inherent information security. Cite all sources.
Responses need to be at least two paragraphs of short answers