SEC 405 Week 1 Discussion 2
SEC 405 Week 1 Discussion 2: "Detecting Computer Crime"
- From the second e-Activity, summarize two methods authorities use in order to detect, deter or investigate computer crime. Cite all your sources.
- From your research, describe the technology/methodologies an organization can implement to deter computer crime from reoccurring.
Research the Internet for 2 articles, case studies or other sources that exemplify methods that authorities use in order to detect, deter or investigate computer crime.
Institution & Term/Date | |
Term/Date | Strayer University |
-
$5.00