PLease answer in deatl about this cyber secuirty question.
Privacy goes hand in hand with security, but many of the activities of information security analysts seem to be an invasion of privacy.
Discuss how employers can justify the use of tools such as Encase by Guidance Software