Cover Letters (Ancient Near Eastern Death & Burial Course)
May 8, 2020
Any topic (writer’s choice)
May 8, 2020
Show all

Computer Science

 

Research and discuss a well known public incident response or data breach to include how the system was compromised and how the problem was remediated or what could have been done to prevent the intrusion or the compromise of the data before it happened.

Resources:

  • Incident Response & Computer Forensics, 3rd Edition
  • Any digital forensic forum or blog such as , , or the .

Leave a Reply

Your email address will not be published. Required fields are marked *