1. Handling forensic evidence in cyber crime situations must be done very carefully. Discuss the many pitfalls that an investigator must be aware of.
2. One of the methods used in extracting computer forensics evidence is to freeze the computer. While this is considered a good approach by many people, there are those who think it is shoddy work. Discuss the merits and demerits of computer "freezing."