Problem
Evaluating MIT: Discarded Hard Drives Yield Private Info.
Debate the effects that encryption can have on incident response activities.
Provide example of an incident where encryption could be used as protection from an intruder or attacker and identify the actions that could be taken by the incident responders to manage the situation. Consider how encryption technologies could hamper an investigation.