who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques.

Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be … Read more

Time to put on your epidemiology hat! Investigate and describe one disease outbreak (epidemic, endemic, sporadic, pandemic, etc.) in the last 200 years. Explain why the outbreak was classified as

Time to put on your epidemiology hat! Investigate and describe one disease outbreak (epidemic, endemic, sporadic, pandemic, etc.) in the last 200 years. Explain why the outbreak was classified as such. As an epidemiologist, how would you prevent this type of outbreak in the future?

was solved and the methods used to determine how the crime was

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include … Read more