1) Review the material on routers.
It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that? If true, what then is the most useful information collected from these devices in an investigation?300 words
2) Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.
3) Discuss in 500 words the top 5 details that should be included in your cloud SLA.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs
4) Topic : Good Browser Hygiene and Cloud Security
1. 5 source annotated bibliography
2. slide presentation with 12 or more slides
3. Summary or Abstract containing at least 750 words.
The topic must be appropriate for graduate level
5) Review in 500 words in the video called Cloud Security Myths.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.
Link : https://www.youtube.com/watch?v=W_O7mziH3vM