Identify and analyze the nature of computer security incidents and the source of potential threats.

computer security

Reflection Paper

In a short paper (2-3 pages), please address each of the topics below with a 2-3 paragraph narrative for each section.

1. Course Content: Describe the most important aspects of this course for you with respect to the content that was covered or activities in which you participated.

Discuss the relevance and value or the practicum assignment with respect to your knowledge acquisition.

2. Application of Course Content: Describe how you applied what you learned in this course at your workplace.

Discuss how this course may have impacted your specific job, techniques you used at work, or other relevant aspects that show how what you learned was linked to your job.

3. Job Experience Integration: Describe how your work experiences were used in the classroom and attributed to your performance in the course.

Discuss how integrating your work experiences in class activities assisted in understanding topics discussed within the course.

Course Description:

In this course, students research leading tools, technologies and methodologies used in identifying, prioritizing and mitigating information system threats and vulnerabilities; identify and evaluate security controls; and formulate risk mitigation strategies.

Course Objectives:

At the conclusion of this course students will be able to:

  • To identify and analyze the      nature of computer security incidents and the source of potential threats.
  • To demonstrate knowledge of a      methodology for end-to-end incident management and mitigation.
  • To analyze and evaluate the      technical issues associated with incident management and in the      identification of criminal actions using network trace back and computer      forensics.
  • To apply the rules of      evidence to electronic security incidents in the identification of      criminal actions using network trace back and computer forensics.
  • To understand the influence      of digital forensics in the process of attributing computer related      incidents and crimes.
find the cost of your paper