1) Security Measures
Research The Phases of Access Control and its Pros and Cons
2) System Profiling
Assume you are all working as the security team in the IT department of a company. The upper-level management is considering the use of an effective approach to analyze and profile their systems. Possibly with the help of online research, post something about a strategy, tool, or issue related to this that can aid the company in making a decision.
3) System Hardening
In this module, you have been exposed to hardening security in many aspects of Windows systems. Pick any one aspect (e.g., password policy) and explain why you consider it important to harden it. Please include any realistic threats in that aspect and also possible remedies.
4) Computer Forensics
Share with other students your experience or knowledge of a computer forensics case that you found interesting. Make sure to mention as to what constitutes an incident and the evidence in your selected case.
Important: Please state how Integrity core value is important to forensic technicians.