a. Describe risks and threats in information security
b. Describe security department's role in information technology (IT)
c. Describe private cyber investigations.
d. Describe deception clues
e. Describe professional reputation and recognition of a witness.
f. Describe direct examination
g. Describe the auditor's role in litigation support.