Discuss the case, the investigation process, data recovery, securing the evidence and chain of custody. Remember to explain the types of software you would use to complete the case.

Part. 1 (1-page/5-Sources) Submit a one page outline with your proposed term paper title, statement, and an outline of the subtopics you will cover in your paper. Provide at least 3 references in APA format showing you have been successful in finding resources for your topic.

The outline is for a 4-6 page term paper on a computer related crime which can be solved by using computer forensics. You must detail the procedures used in discovering and investigating the evidence.

Discuss the case, the investigation process, data recovery, securing the evidence and chain of custody. Remember to explain the types of software you would use to complete the case. You may use the cases noted in the book for guidance or may use one of your own. When writing the term paper you must have a minimum of 3-5 outside sources cited and referenced using APA Style formatting in the paper.

Part 2. (1-page/5- Sources) For this exercise –  create the outline for your paper. The outline should include the following all in APA format:
Title page with title, name date, class, professor, and university info
Top level headers which outline what you will be talking about in your paper (from the list of supplied topics provided below)
Second level headers which outline specific detail headers for each of your top level headers.
A bibliography list with at least 5 sources.

Below is a list of pre-approved topics:
Protecting WLAN: A Roadmap for Securing the Enterprise
Best Practices for Wireless Security
Firewalls: Great Network Security Devices, but Not a “Silver Bullet” Solution
Modern Day Attacks Against Wireless Networks
Wireless Security Vulnerabilities Exposed

Discuss the case, the investigation process, data recovery, securing the evidence and chain of custody. Remember to explain the types of software you would use to complete the case.
Scroll to top