Computer crimes book:Digital Evidence & Computer Crime: Forensic Science, Computers and the Internet please use a reference than. 1.Correlate the similarities between an arson investigation and intrusion investigations. 2.Outline how a system administrator can identify intrusions and how this information can be used by digital investigators. 3.Describe the two primary forms of accepted undercover cyber-investigation: 1) investigators posing as a fictitious potential victim, and 2) investigators taking on the identity of a victim who has already been contacted, and give your conclusions as to benefits of both. 4.Write about the motives underlying pornography by (1) identifying the type of pornography (sadistic, domination, child, etc.), (2) how it was gathered (from available sources, self-created), and (3) what is done with it once obtained (e.g., digitally altering images to show children or celebrities in sexual or violent situations).