Cyber law ITN 260
In a world dominated by computing and social media there has been an increased need
for computer forensics technicians. Computer forensics examines and identifies the logistical
data that has been used to commit a cri
Grading Notes: You need to provide 18 different risks, identify an impact on business for each, and identify (1) security
control to control that risk (your example shows three, however only 1 is required).
Hacking Extra Credit
Hacking is about the knowledge of how to exploit the vulnerabilities of a system.
Hacking began with the hacking of phone services. It allowed hackers to intercept and use the
phone systems to exploit the vulnerabi