SAINT COM520 MODULE 7 AND 8 DISCUSSION
Question # 00065273
Posted By:
Updated on: 04/27/2015 05:24 AM Due on: 05/12/2015

mod 7
Share with other students your experience or knowledge of a computer forensics case that you found interesting. Make sure to mention as to what constitutes an incident and the evidence in your selected case.
You may not duplicate someone else’s topic, so check before you research. Duplicate topics (determined by date/time posted) will be given a 0 grade. In addition, respond to at least two of your classmates’ postings.
mod 8
Developing secure software in a secure IT infrastructure is an ongoing process. Refer to the Washington School Information Processing Cooperative (WSIPC) case study as described in the text sheet ts_wispc.docx available under “Doc Sharing.” Think of the tools and strategies WSIPC would have applied to reduce their security vulnerabilities. Discuss what other controls may exist in other infrastructure domains to further increase WSIPC’s security.
Share with other students your experience or knowledge of a computer forensics case that you found interesting. Make sure to mention as to what constitutes an incident and the evidence in your selected case.
You may not duplicate someone else’s topic, so check before you research. Duplicate topics (determined by date/time posted) will be given a 0 grade. In addition, respond to at least two of your classmates’ postings.
mod 8
Developing secure software in a secure IT infrastructure is an ongoing process. Refer to the Washington School Information Processing Cooperative (WSIPC) case study as described in the text sheet ts_wispc.docx available under “Doc Sharing.” Think of the tools and strategies WSIPC would have applied to reduce their security vulnerabilities. Discuss what other controls may exist in other infrastructure domains to further increase WSIPC’s security.

-
Rating:
5/
Solution: SAINT COM520 MODULE 7 AND 8 DISCUSSION