Cloud Computing and Digital Forensics

1.) Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Use at least three sources. Use the   Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  

Stand alone quotes will not count toward the 3 required quotes.

2.) Using the Web or other resources, find a case where an illegal search was claimed.

Write a brief essay of 300 words describing that case and how it relates to this week’s topic.

Tags: No tags