Question1: 300 word essay with 2 latest journal article references in APA. Intext citations must
A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail.
Why do think all of these skills are necessary? Please explain.
Question2: 3-4 paragraph essay with 2 latest journal article references in APA. Intext citations must
Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime.
Explain the crime that was solved and the methods used to determine how the crime was committed.
Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).
Question3: 300 word essay with 2 latest journal article references in APA. Intext citations must
If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?
Question 4: Creating Company E-mail/WIFI/Internet Use Policies (5 and more page excluding reference page in APA with 4 latest journal article references)
Cybersecurity Planning and Management
You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.
There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.
You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.
Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).
5. Policy Compliance
6. Related Standards, Policies and Processes
7. Definitions and Terms