ISSC451 W7: Digital Forensics and Information Security| Discussion

Description

Your follow-up posts can add additional insight to a classmate’s opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. For your follow-up posts this week, you may wish to visit a couple of the web sites contributed by your classmates and share your opinion of these sites with the class. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification. You are encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end of your post. 1. Explain the process used to preserve the verifiable integrity of digital evidence. How does this ensure that data is preserved unmodified? How can an analyst show that the original evidence is modified?2. What is a firewall? Identify and explain some of the functions of a firewall. What are its limitations?

Don't use plagiarized sources. Get Your Custom Assignment on
ISSC451 W7: Digital Forensics and Information Security| Discussion
From as Little as $13/Page