criminal justice

criminal justice
Each answer should be a minimum of two paragraphs long.

1) Explain how authentication, access control, and auditing work together to establish defense in layers for a network.
2) Describe the impact of a breach of the CIA triad for the campus police department at a midsized private university. Be sure to describe what type of attacks could lead to a CIA triad breach.
3) You have been hired by the Connecticut State Police to replace their current authentication system for the agency’s criminal database. The old system used a user name and user selected password for authentication. What type of two-factor authentication would you use and why? Account for potential problems your new authentication system could face.
4) Explain what the OSI is and the importance that it plays in network security.
5) Describe the network investigation tools that are available online and explain how these tools can be used in a network crime investigation.
6) Describe in detail the problems to investigators caused by the format of digital evidence.

READ ALSO :   rapid communication