SEC 405 Week 9 Assignment 4, Discussion Question – Complete


Category: SEC 405 Tag: sec 405


SEC 405 Week 9 Assignment 4

You have been recently hired to assist with purchasing computer forensics tools and resources for a major corporation. Using the concepts that you learned in chapters nine (9) through twelve (12) recommend specific tools that can be used for computer forensics investigation.

Write a 3-4 page paper in which you:

  1. Compare and contrast features and costs of at least two (2) programs that can be ….to recover deleted files.  Include the success rates and specific functions each program offers. 
  2. Specify the costs associated with purchasing two (2) tools that can be … gather digital evidence from a cell phone.  Include specific hardware or additional devices that will be required.
  3. Identify hourly costs associated with specific certified computer experts that can be …..for forensics purposes and suggest a certified computer professional, you think, would be effective for a court case.
  4. Summarize a current event article based on how an expert’s deposition helped the case at trial.  Include specifics on how the deposition was …….and what was … ensure that it was provided truthfully and concisely.
  5. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources
SEC 405 Week 9 Discussion 1, Online Predator Threats
  • Suppose, you have been selected by your school to write a news bulletin on steps that parents can take in order to protect their children against online predators. Highlight the most important items a parent should know and what they can do to protect their child. 
  • From the previous scenario, suggest three tools that can be … safeguard children along with three assessments that parents can perform in order to determine their level of threats.
SEC 405 Week 9 Discussion 2, Online Harassment and Identity Theft
  • From the e-Activity, compare and contrast at least two tools that can be ….to minimize online harassment and identity theft.  
  • Outline the various features that these tools provide.  Give an example on how this tool can be effective for online users.  Describe any accolades or awards these tools have received.sec 405 week 9