Reference no: EM133191791 , Length: word count:500
PART 1
Question 1: Select ONE type of software tool from the list below. Using the internet or online library, find an article, case study, or publication about computer forensics that addresses the specific software tool you chose.
Summarize your findings in at least 300 words. Be sure to provide a link to the article, case study, or publication.
1) Device Seizure by Paraben
2) ForensicSIM by Evidence Talks
3) USIMdetective by Quantaq Solutions
4) SIMCON by Inside Out Forensics
5) .XRY by Micro Systemation
6) MOBILedit! Forensic by Compelson Laboratories
PART 2
IN 500 WORDS OR MORE
Question 2: Why should people care about password security?
Question 3: Can computer hacking be justified under extraordinary circumstances. Imagine that you will have to break into a neighbor's car in order to drive a friend, who will otherwise die, to the hospital. You are morally obligated to save a person's life when it is in your power to do so. You are also obligated to obey the law, which forbids breaking into someone's motor vehicle. How would your decision in this case be similar or different from determining whether to break into the computer database containing the medical information needed to save someone's life? Research HIPPA. How would this effect your decision, or would it? Can this be justified in a court of law. See if you are able to find similar cases in regard to computer hacking.
Question 4: What is cyberstalking? Research cyberstalking/harassment by communication laws in your state. What would you do, if anything to improve the laws. There are 3 states that currently do not have laws. If you live in one of those states please choose a state to research. Find a case from your state.