ISSC451 Digital Forensics and Information Security Discussion

For this assignment you will post your answers to the questions in each thread prior to 11:59 p.m. ET on Wednesday at 11:59 pm. Additionally, you must respond to at least two of your classmates posts by 11:59 pm ET on Sunday. Your follow-up posts can add additional insight to a classmate’s opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. For your follow-up posts this week, you may wish to visit a couple of the web sites contributed by your classmates and share your opinion of these sites with the class. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification. You are encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end of your post. References must be in APA citation format. All posts must be a minimum of 250-300 words. All follow-up posts to your classmates must be a minimum of 150 words for each required post.

1. Explain the process used to preserve the verifiable integrity of digital evidence. How does this ensure that data is preserved unmodified? How can an analyst show that the original evidence is modified?

2. What is a firewall? Identify and explain some of the functions of a firewall. What are its limitations?

 

"Is this question part of your assignment? We Can Help!"