It is critical for the investigator to understand the possible security risks that computer and network users face before conducting computer forensic investigations.
- Use the library, the course textbook, and the Internet to research information about security risks and several security threats that computer and network users face that require a forensic response. Focus on the security risks involved in computing, the goals of secure computing, the threats to security in computing, finally the controls available to address these threats.
- Write a 1-2 page report including:
- A title page
- An introduction to the contents of the report
- An explanation of the possible security risks involved when conducting computer- and network-based operations
- A list of 5-10 possible threats facing computer and network users
- Identification of at least 4 controls available to address security threats
- A summary of all risks, threats, and controls and their importance to the computer forensic investigator's knowledge base
- Be sure to reference all sources in APA format. For more information on APA, please visit the APA Lab.