From the first e-Activity, identify one to two (1-2) potential ethical challenges that security professionals may face as technology advances, applications become more mobile, and computer criminals become more innovative. Speculate on one (1) solution that security professional could take in order to mitigate the challenge(s) in question. Justify your response.
From the second e-Activity, among the three (3) definitions of cyber terrorism, give your opinion as to the one (1) definition that is the most accurate with regard to information security and infrastructure protection. Next, describe the impact that digital crimes and digital terrorism are likely to have in the future. Provide a rationale for your response.
From the first e-Activity, discuss the fundamental advantages that the commercial forensic packages offered to forensic investigators. Next, speculate on whether there is an overall disadvantage(s) to using commercial packages in digital forensics. Justify your response.
From the second e-Activity, discuss the key process that a forensic analyst could use in order to preserve the verifiable integrity of digital evidence. Next, identify the main tools or technologies that the forensic analyst could use in order to ensure that the original evidence is unmodified.