cist 1401 chapter 11

0 comments

PART 1

As a network technician, you’ll be better prepared to spot security issues if you’re already familiar with breaches that have affected other networks in the past. In this project, you will research three computer forensics investigations. Use complete sentences, good grammar, and correct spelling in your answers. Complete the following steps:

Using a search engine, find articles, blogs, or videos discussing three different computer forensics cases. Identifying information might have been changed to protect privacy, but be sure the cases are actual cases, not just theoretical ones. Document your source or sources for each case.

Answer the following questions for each case:

  • How was the problem discovered?
  • What clues initiated the investigation?
  • What crime was committed or suspected?
  • What evidence was collected using computer forensics?
  • Were there any significant mistakes made in collecting this evidence?
  • What was the final outcome of the case?

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}