6/3 discussion

Answer the following: 

  1. What types of security incidents are possible within an information systems infrastructure? Select one such incident and detail how you would respond to the incident.
    1. Describe key concepts in computer forensics. What important practices should be followed when gathering forensics data?
    2. Categorize the most important concepts related to legal, ethical, and privacy issues in the field of computer security. How would you go about implementing compliance to the policies in order to protect your organization?
  2. Your initial post should be at least 300 words and supported with at least three references.

Leave a Reply

Your email address will not be published. Required fields are marked *