During this module, you explored the topics of digital forensics and investigations. You have undoubtedly heard and read about the different types of computer misuse.
- Describe what you feel are the three best uses of digital forensics. Give reasons for your choices.
- Provide support for those choices using sources from your textbook or the Saudi Digital Library to support your viewpoint.
In preparing your response, include at least one source from professional or academic literature—such as articles from peer-reviewed journals and relevant textbooks. For this course, Wikipedia is not considered an academic or professional reference. Also, proofread and spell check your responses. All sources should be formatted using APA guidelines.
You need to reply to at least two of your peers’ answer posts to this discussion question. These replies need to be substantive and constructive in nature. They should add to the content of the post and evaluate/analyze the answer. Normal course dialogue doesn’t fulfill these two peer replies, but is expected throughout the course. Answering all course questions is also required.
The required textbook for this course is:
Easttom, C. (2019). System forensics, investigation, and response (3rd ed.). Burlington, MA: Jones & Bartlett Learning. ISBN-13: 978-1-284-12184-1


0 comments