Identify how the IT Department might be organized in relation to these two areas. Describe how network and telecommunications might be integrated or separate divisions and issues related to both structures.

Individual Paper

Write a paper, in APA format, that describes the difference between network management and telecommunications management.

Be sure to discuss the types of things that need to be monitored.

  • Identify how the IT Department might be organized in relation to these two areas.
  • Describe how network and telecommunications might be integrated or separate divisions and issues related to both structures.
  • Identify the relevance for service level management, metrics, and scorecards.

Discuss several ways HR can positively or negatively affect organizational culture. Give four examples of ethical issues you have experienced in jobs and explain how HR did or did not help resolve them.

The Environment of Human Resource Management

Several current HR trends affect how companies manage people at work. For example, employees are expected to have the proper knowledge, skills, and abilities (KSAs) to perform in an environment that presents constant changes and new expectations. This requires HR professionals to be at the top of their game when developing policies that help people get better at what they do. Here are some issues that are currently trending in HR:

The rapidly changing workplace focuses HR efforts on developing human capital factors that address organizational needs (e.g., productivity, customer service, quality, and innovation). Once employees are developed, they need to be placed in the proper jobs with positive work cultures that enable them to use their talents effectively.

Globalization and workforce diversity present ways for individual differences to help companies. However, challenges associated with properly placing employees and developing positive HR policies in diverse environments are common.

When managing human resources, technology is viewed as a key means to an end. Increased social media, online interactions, and software to manage traditional HR functions can enhance how individuals interact with their employers, supervisors, and coworkers.
The importance of ethics policies, social responsibility, and sustainable practices has never been greater. Misconduct in organizations has raised the profile of organizational culture and sound HR practices to ensure appropriate workplace behavior. Developing an ethical culture, providing ethics training, and encouraging employees to report offenses are all ways that HR leaders can help improve business ethics.

This module provides a strong overview of how firms can use HR strategies and initiatives to deal with external and internal challenges, which are then explored in detail in later chapters.
What is Human Resource Management (HRM)?

HRM focuses on the legal implications of policies and procedures affecting employees. In the 1990s, facing globalization and competition, human resource departments became more concerned with costs, planning, and the implications of various HR strategies for organizations and their employees. More recently, human resource professionals in some companies have been involved with mergers and acquisitions, outsourcing, and managing technological advances in the workplace. Recent high-profile corporate scandals and unethical behavior also require HR professionals to get more involved in programs that increase ethics, compliance, and social responsibility.
Human resource management is designing formal systems to manage human talent to accomplish organizational goals. Whether you work in a large company with 10,000 employees or a small nonprofit organization with ten employees, employees must be recruited, selected, trained, rewarded, managed, and retained. Each activity requires knowledge about what works well, given current employee concerns and company conditions. Research into these issues and the knowledge gained from successful approaches form the basis of effective HR management.

Why do organizations need HR Management?
There are many benefits associated with having a dedicated HR department. Firms that implement effective HR practices tend to have better outcomes, such as higher profits, increased stock price, and greater productivity, than those that do not use such practices. HR professionals must respond appropriately to current business challenges and opportunities to help the organization succeed.
Contemporary organizations’ significant issues include building the “organization of the future;’ delivering a superior employee experience, and capitalizing on diversity and inclusion. HR professionals can make a difference by implementing solutions to these challenges.

Additional trends include a globalized workforce, greater age diversity, a focus on sustainability, and an emphasis on social media. HR leaders can address these issues by adopting an interdisciplinary business approach (e.g., working with marketing, operations, and finance staff), connecting with outside constituencies, identifying critical organizational challenges, and facilitating organizational change.

HR professionals might also adapt HR processes to fit workplace changes, work more closely with IT personnel to manage technology, hire more high performers with the right skills, and be innovation leaders. The following “HR Perspective: Transforming HR at Popeyes Louisiana Kitchen” feature highlights some of these emerging trends, as well as others.
Human Capital Organizations must manage four types of assets to be successful (see Figure 1-1):
Physical assets: Buildings, land, furniture, computers, vehicles, equipment, and so on.
Financial assets: Cash, financial resources, stocks, bonds or debt, etc.
Intellectual property assets: Specialized research capabilities, patents, information systems, designs, operating processes, copyrights, etc.
Human assets: Individuals with talents, capabilities, experience, professional expertise, relationships, etc.

Based on this information answer the following questions, indicate the answer for each question

1-1. Discuss several ways HR can positively or negatively affect organizational culture.

1-2. Give four examples of ethical issues you have experienced in jobs and explain how HR did or did not help resolve them.

1-3. Why is it important for HR management to transform from being primarily administrative and operational to a more strategic contributor?

What is happening now in terms of privacy on the Web? Think about recent abuses and improvements. Describe and evaluate Web site policies, technical and privacy policy protections, and current proposals for government regulations.

Assignment Paper A

Paper A: Apply one of three decision-making frameworks to an IT-related ethical issue. This requires a 3-5 page paper addressing a leading ethical issue (suggested topics are provided in the Week One details located in Course Content). You will use one of the three decision-making frameworks from UMGC Module Two to analyze the issue and select one of the four common approaches to ethical decision making, from UMGC Module One.

Instructions
Paper A: Application of a decision making framework to an IT-related ethical issue.

This assignment is an opportunity to explore and apply a decision making framework to an IT-related ethical issue. A framework provides a methodical and systematic approach for decision making. UMGC Module 2 – Methods of Ethical Analysis (see LEO Content – Readings for week 2) describes three structured frameworks that may be used for ethical analysis, namely Reynolds Seven-Step Approach, Kidder’s Nine Steps, and Spinello’s Seven-Step Process. There are several ways described in UMGC Module 2 to systematically approach an ethical dilemma, and while each of the frameworks described has its merits, each will result in an ethical decision if straightforwardly, objectively, and honestly applied.

In addition, consider the ethical theories described in Module 1 – Introduction to Theoretical Ethical Frameworks (see LEO Content – Readings for week 1) which help decision makers find the right balance concerning the acceptability of and justification for their actions. A separate write-up of the ethical theory that supports your decision is part of the following requirements.

For this paper, the following five elements must be addressed:

– Describe a current IT-related ethical issue: Since this is a paper exercise, not a real-time situation, you may want to construct a brief scenario where this issue comes into play, and thus causes an ethical dilemma. The dilemma may affect you, your family, your job, or your company; or it may be a matter of public policy or law that affects the general populace. See the list below for a list of suggested issues, which may be a source of ethical dilemmas.

– Define a concise problem statement that is extracted from the above description or scenario. It is best if you define a specific problem caused by the dilemma, that needs a specific ethical decision to be made, that will solve the dilemma. Be aware that if it is a matter of public policy or law, that it may require a regulatory body or congressional approval to take action to implement a solution.

– Analyze your problem using one of the structured decision-making frameworks chosen from Module 2. Make sure that you identify the decision-making framework utilized. In addition, the steps in the decision-making framework selected must be used as major headings in the Analysis section.

– Consider and state the impact of the decision that you made on an individual, an organization, stakeholders, customers suppliers, and the environment, as applicable!
State and discuss the applicable ethical theory from Module 1 that supports your decision.

Concerning your paper:

– Prepare a minimum 3- 5 page, double-spaced paper and submit it to the LEO Assignments Module as an attached Microsoft Word file.
– Use headings for each topic criteria
– Provide appropriate American Psychological Association (APA) source citations for all sources you use. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
– Include a Cover Page with your Name, the UMGC/Name of the Class, and the Title of the Paper.

For example, Kidder’s approach has nine steps, which are:

– Recognize that there is a moral issue.
– Determine the actor (whose moral issue is it?).
– Gather the relevant facts.
– Test for right-versus-wrong issues.
– Test for right-versus-right paradigms (what sort of dilemma is this?).
– Apply the resolution principles (ends-based, rule-based, or care-based).
– Investigate the “trilemma” options (look for common ground or compromise).
– Make the decision.
– Revisit and reflect on the decision. (Kidder, 1995, p. 183-187)
– Reminder: Each of the steps for whatever framework that you select must be a major heading in the Analysis section of your paper.

Here are some suggested issues for you to consider, the additional text is designed to help you flesh out the issue:

1. Privacy on the Web: What is happening now in terms of privacy on the Web? Think about recent abuses and improvements. Describe and evaluate Web site policies, technical and privacy policy protections, and current proposals for government regulations.

2. Personal Data Privacy Regulations in Other Countries: Report on personal data privacy regulations, Web site privacy policies, and governmental/law enforcement about access to personal data in one or more countries; e.g., the European Union. This is especially relevant as our global economic community expands and we are more dependent on non-US clients for e-business over the Internet.

3. Computer-Based Crimes: Discuss the most prevalent types of computer crimes, such as Phishing. Analyze why and how these can occur. Describe protective measures that might assist in preventing or mitigating these types of crimes.

4. Government Surveillance of the Internet: The 9/11 attacks on the US in 2001 brought many new laws and permits more government surveillance of the Internet. Is this a good idea?

5. The Digital Divide: Does it exist; what does it look like; and, what are the ethical considerations and impact?

6. Privacy in the Workplace – Monitoring Employee Web and E-Mail Use: What are current opinions concerning the monitoring of employee computer use. What policies are employers using? Should this practice of monitoring, be authorized or not?

7. Medical Privacy: Who owns your medical history? What is the state of current legislation to protect your health information? Is it sufficient? There are new incentives with federal stimulus financing for health care organizations to develop and implement digital health records.

8. Software Piracy: How many of you have ever made an unauthorized copy of software, downloaded software or music (free or for a fee), or used copyrighted information without giving proper credit or asking permission? Was this illegal or just wrong? How is this being addressed?

9. Consumer Profiling: With every purchase you make, every Web site you visit, your preferences are being profiled. What is your opinion regarding the legal authority of these organizations to collect and aggregate this data?

10. Biometrics & Ethics: Your fingerprint, retinal-vessel image, and DNA map can exist entirely as a digital image in a computer, on a network, or in the infosphere. What new and old ethical problems must we address?

11. Social Networking: What are some of the ethical issues surrounding using new social networks? How are these now considered for business use? What are business social communities? Are new/different protections and security needed for these networks?

12. Gambling in Cyberspace: Is it legal? Are there national regulations and/or licensing? What are the oversight and enforcement requirements? Are there international implications? What are the social and public health issues?

13. Pornography in Cyberspace: For example, the U.S. Supreme Court ruling protecting as free speech computer-generated child pornography

14.Medicine and Psychiatry in Cyberspace: Some considerations include: privacy issues; security; third-party record-keeping; electronic medical records; access to information, even by the patient (patient rights); access to information by outsiders without patient knowledge; authority to transfer and/or share information. Are there any policies proposed by professional organizations?

15. Counterterrorism and Information Systems: Your protection versus your rights

16. Open-source Software versus Closed-source Software: Ethical ramifications and impact on intellectual property law

17. Creative Commons Licenses: How do they work and what are the legal and ethical impacts and concerns?

18.Universal ID card: What is the general position of the U.S. government about issuing each individual a unique ID card? Which individual U.S. government agencies have already provided a unique ID card? What steps have been taken to include individual ID information electronically in passports? How is privacy and security provided?

19.Video Games: Does playing video games distract from everyday responsibilities?
Do video games correlate with real world violence? Why do game creators continually increase the violence of video games? What is video game addiction?

20. Cyberbullying: What is cyberbullying and what can be done to stop it?

21. Net Neutrality: What is the current position of the federal government and is it fair to all?

How did your purpose and audience shape the way in which you wrote your argument? What was the most difficult part of writing your argumentative essay?

Argumentative Essay

ASSIGNMENT: For Touchstone 2, you will be writing an argumentative essay on a topic of your choice. The topic you choose must be debatable and you must take a clear stand on one side of the issue. Your topic must also be on a small enough scale that it is appropriately narrow for a 1,000-1,500 word (3-5 page essay).
Your essay must include a title, an introductory paragraph, which contains your argumentative thesis statement, at least three body paragraphs, which provide support for your argument, and a conclusion paragraph.
Research from at least two outside sources is required to provide evidence and support for your argument. Research must be cited using APA style.
You must include a reference page, which lists the specific sources you used and properly cite the sources within your essay.
An example essay is provided below for reference. Please read this before writing your essay.

DIRECTIONS: Below your assignment, include answers to all of the following reflection questions.

How did your purpose and audience shape the way in which you wrote your argument? (1-2 sentences)
What was the most difficult part of writing your argumentative essay? (2-3 sentences)
Which appeals did you use and how do you think they strengthened your argument? (3-4 sentences)
How has your understanding of argumentative writing changed after completing this unit? (2-3 sentences)

What is capital budgeting? Explain its needs and importance. What are the stages of capital budgeting process? Explain the various methods of capital budgeting techniques.

Financial Management

  1. What is capital budgeting? Explain its needs and importance.
  2. What are the stages of capital budgeting process?
  3. Explain the various methods of capital budgeting techniques.
  4. What is risk and uncertainty?
  5. Calculate the payback period from the following information: Cash outlay Rs. 50,000 and cash inflow Rs. 12,500. (Ans. 4 years)
  1. From the following information, calculate the pay-back periods for the 3 projects.

Which liquors Rs. 2,00,000 each? Suggest most profitable project.

Year Project I Project II Project III

1 50,000 60,000 35,000

2 50,000 70,000 45,000

3 50,000 75,000 85,000

4 50,000 45,000 50,000

5 50,000 – 35,000

  1. The machine cost Rs. 1,00,000 and has scrap value of Rs. 10,000 after 5 years. The net profits before depreciation and taxes for the five years period are to be projected that Rs. 20,000, Rs. 24,000, Rs. 30,000, Rs. 26,000 and Rs. 22,000. Taxes are 50%. Calculate pay-back period and accounting rate of return. (Ans. 4 years 3 months and 11.2%)
  1. A company has to choose one of the following two actually exclusive machine. Both the machines have to be depreciated. Calculate NPV.

Cash inflows

Year Machine X Machine Y

0 –20,000 –20,000

1 5,500 6,200

2 6,200 8,800

3 7,800 4,300

4 4,500 3,700

5 3,000 2,000

Capital Budgeting 145

  1. A machine cost Rs. 1,25,000. The cost of capital is 15%. The net cash inflows are as under:

Year Rs.

1 25,000

2 35,000

3 50,000

4 40,000

5 25,000

Calculate internal rate of return and suggest whether the project should be accepted of cost.

  1. Which project will be selected under NPU and IRR? A B

Cash outflow 2,00,000 3,00,000

Cash inflows at the end of

1 Year 60,000 40,000

2 Year 50,000 50,000

3 Year 50,000 60,000

4 Year 40,000 90,000

5 Year 30,000 1,00,000

Cost of capital is 10%.

  1. SP Limited company is having two projects, requiring a capital outflow of Rs. 3,00,000. The expected annual income after depreciation but before tax is as follows:

Year Rs.

1 9,000

2 80,000

3 70,000

4 60,000

5 50,000

Depreciation may be taken as 20% of original cost and taxation at 50% of net income:

You are required 10 calculated

(a) Pay-back period (b) Net present value

(c) According rate of return (d) Net present value index.

(e) Internal rate of return.

 

  1. From the following information, select which project is better. Cash Inflows (Year) I II

0 –20,000 –20,000

1 7,000 8,000

2 7,000 9,000

3 6,000 5,000

Risk less discount rate is 5%. Project I is less risks as compared to project II. The management consider risk premium rates at 5% and 10% respectively appropriate for discounting the cash inflows.

  1. There are two mutually exclusive projects I and II. Each projects requires an investment of Rs. 60,000. The following are the cash inflows and certainly co-efficient are as follows.

Project I Project II

Year Cash inflow Certainty Cash Inflow Certainty

Co-efficient Co-efficient

1 30,000 .7 25,000 .9

2 25,000 .8 25,000 .8

3 25,000 .9 30,000 .7

Risk-free cutoff rate is 10%. Evaluate which project will be considered.

  1. Mr. X is considering two mutually exclusive investment I and II. From the

following details advice Mr. X.

Project I Project II

Cost of investment 75,000 75,000

Annual income for 5 years Optimistic 37,500 41,250

Most likely 26,250 22,500

Pesionistic 15,000 15,000

The cutoff rate is 12%.

Capital Budgeting 147

  1. Two mutually exclusive projects are being considered. The following detail is

available.

Year Project A Project B

Rs. Profitability Rs. Profitability

1 12,000 – 12,000 –

2 10,000 .2 10,000 .2

3 15,000 .6 20,000 .6

4 25,000 .2 20,000 .2

  1. Mr. A is considering two mutually exclusive investment projects, from following information select the Project on the basis of standard deviation and co-efficient of variation method.

Cash Project I Project II

Rs. 15,000. Rs. 15,000

Cash inflow Rs. Probabilities Rs. Probabilities

Year

1 3,000 .3 4,000 .1

2 4,000 .2 6,000 .4

3 7,000 .3 7,000 .3

4 6,000 .2 3,000 .2

  1. Mr. X is considering the project an investment of Rs. 26,000. The expensed returns during the life if the project of are as follows:

Year I Event Cash inflow Probability

a 12,000 .2

b 14,000 .6

c 9,000 .2

Year II

Cash inflows is year I are.

Rs. 12,000 Rs. 14,000 Rs. 9,000

Cash inflow Probability Cash inflow Probability Cash inflow Probability

1 18,000 .3 22,000 .2 28,000 .4

2 20,000 .4 26,000 .7 32,000 .5

3 20,000 .3 30,000 .1 35,000 .1

Using 10% as the use of capital, advise about the acceptability of the proposal.

 

 

 

 

Identify and discuss the steps necessary to make electronic evidence admissible in court. Identify various crimes and incidents that are involved in electronic forensic investigations.

Digital forensics and Computer Crime

Instructions:

Write an 8 page paper discussing the below topics as they relate to computer crime.

Submission Instructions:

You must provide cases and examples to support the topics.

1) Identify and discuss the steps necessary to make electronic evidence admissible in court.

2) Identify various crimes and incidents that are involved in electronic forensic investigations.

3) Discuss the importance of security and computer use policies.

4) Identify and discuss the techniques to obtain evidence from Internet and Web resources.

5) Identify and discuss the types of evidence that can be recovered from computer and electronic devices.

6) Discuss the importance of documentation and chain-of-custody in the forensic process.

Explain RAID and how it can be properly utilized in a Server system. Discuss the different options and how it is configured either through hardware or software.

Discussion: Select One of the Following Topics:

  • You have a Server that has been acting strangely. You decide that it either needs an upgrade or a fresh install. What questions do you have to ask yourself to help decide which one you perform? Could you decide either option? Discuss your choice(s) and why you decided the option you did. Make sure you describe any past experience with the Server operating system and any issues that came from an install.
  • Explain RAID and how it can be properly utilized in a Server system. Discuss the different options and how it is configured either through hardware or software.
  • Discuss the different Server roles and how they can be used together or when they should be separated into different machines. Who makes the call to do that?

 

Analyze the multi-national and global ethical aspects of the article – what is the impact or what is the importance of the information in the article and what are the ethical issues connected to the situation or event?

IFSM 304 Section 6381- Assignment: Current Events – Student Miguel R.

Assignment

Paper CE: Analysis of a Current Events Article.
The purpose of this assignment is to analyze a current events article (i.e., only one) that you may choose from any online current periodical, trade magazine, or other electronic publication about a global digital ethical issue. While this assignment will increase your knowledge in that subject area from a corporation viewpoint and enable you to analyze digital ethical issues of a current GLOBAL situation or event, it will also help enhance your research and writing skills, as well as your critical-thinking abilities.

Start by selecting one current IT related online article (2017 sources or later) about a global ethical issue. Note that this assignment is not a general essay about the topic selected, it must be about the current event article that you have selected. In addition, please note that while articles from journals may be of interest, they are ultimately too long and involved for this assignment – it is best to find an article from the World Wide Web from a trade magazine, or other electronic publication. Provide the source citation that is in compliance with the American Psychological Association (APA) formatting rules, as well as the persistent URL – one that anyone can click on to re-access the original article.

The following elements must be addressed.

Summarize the whole article by all of its key or salient points. It may help if you use bullets to note the salient points of the article, as you read through it. A summary is desired, not just the “thrust’ of the article.

Analyze the multi-national and global ethical aspects of the article – what is the impact or what is the importance of the information in the article and what are the ethical issues connected to the situation or event?

Determine three critically important questions not otherwise included in the article that you would like to address to the author regarding the article – you are not expected to answer the questions!

Prepare a double-spaced paper and submit it to the LEO Assignments Module as an attached Microsoft Word file. The instructor will provide your grade and feedback via the LEO Grades tool. This assignment does not have a specific length, as the length depends upon the length of the article that is being summarized, but you want to make sure that you have fulfilled the three requirements listed above. Remember to use headings for each topic criteria. The length of Paper CE is not a factor considered in its grading!

Use APA formatted source citations for all sources utilized, in your reference list. Remember, as a minimum, the source citation for your article must be included along with an external link. In addition to critical thinking and analysis skills, your paper should reflect appropriate writing mechanics, good organization, and proper business-writing style. Include a Cover Page with your Name, the UMGC/Name of the Class, and the Title of the Paper.

Rewrite the attachment to ensure specific portable forensic lab kit tools are listed so it is more defined in its intention.

Rewrite Portable Forensic Lab Kit draft

Rewrite the attachment to ensure specific portable forensic lab kit tools are listed so it is more defined in its intention:

 Portable Forensic Evidence Kit

  • Name
  • Course
  • Institution
  • Professor

Portable Forensic Evidence Kit

A portable forensic evidence kit is a set of tools and materials used to collect, preserve, and transport digital evidence in the field, such as during corporate security investigations. It’s important to have the necessary items, properly organize and test them, and have a process for documenting the evidence. Maintaining the integrity of the evidence is also important. These steps help analysts effectively collect and analyze digital evidence in their investigations.

Hardware and Software Needed

A portable forensic kit includes various hardware and software tools that allow it to function efficiently. One important hardware tool is a write blocker, which allows analysts to access data on a storage device without modifying it. It also contains enclosures and connectors, which allow analysts to connect storage devices to a forensic workstation for examination. Furthermore, it has a hardware write protect switch, which prevents any changes to the data on a storage device, and an imaging device, which allows analysts to create a copy of a storage device’s data. The kit may include laptops or tablets for analyzing and documenting forensic evidence, digital cameras for photographing evidence, flashlights for illuminating areas or objects, evidence bags, envelopes, and containers for storing and transporting evidence. The specific hardware included will depend on the investigation’s needs and the analysts’ preferences (Johnson, 2022).

In addition to hardware tools, forensic labs utilize various software tools to facilitate their work. Forensic software is a type of tool specifically designed for forensic analysis. It can extract data from a storage device, analyze it, and present the results in a suitable format. File carving software is another important tool, allowing analysts to recover deleted files from a storage device. Data analysis software can be used to examine data for patterns or anomalies indicative of criminal activity, and cryptographic software can decrypt encrypted data for analysis (Froklage, 2022). These hardware and software tools are essential for helping forensic analysts uncover and understand the digital evidence they are working with.

Creating a Portable Forensic Device

To create an effective portable forensic evidence kit for corporate security investigations, gather and organize items such as evidence bags and digital storage devices. One can include imaging tools, network analyzers, cables and adapters, personal protective equipment (PPE), documentation tools, power sources, and tamper-evident seals. These items allow you to collect, transport, and analyze evidence from various sources like computers, phones, and storage devices. Proper preparation is essential for effectively collecting and analyzing digital evidence during an investigation (Johnson, 2022).

Organize the items in a way that makes them easy to access and use, such as in a portable container like a suitcase and a logical order. Test all equipment to ensure it is functioning properly, like running diagnostics on the imaging software, checking network analyzer batteries, and verifying cables and adapters are in good working order. Create a documentation process to record findings and steps taken during an investigation, like using a notebook to take notes, taking photographs of evidence, and recording the time and date of each step (Johnson, 2022).

Follow proper evidence handling procedures to maintain the integrity of the evidence, such as wearing protective gear, using tamper-evident seals, and following guidelines for handling and storing evidence. By following these steps, you can create a portable forensic evidence kit that is well-organized, functional, and ready to use in corporate security investigations (Johnson, 2022).

 

References

Froklage, P. (2022, December 21). Digital forensics tools: The ultimate guide (2022). Magnet Forensics. https://www.magnetforensics.com/blog/digital-forensics-tools-the-ultimate-guide-2022/

Johnson, K. (2022, October 28). Equipment to include in a computer forensic toolkit. Security. https://www.techtarget.com/searchsecurity/feature/Equipment-to-include-in-a-computer-forensic-toolkit

 

Create a portable forensic evidence kit for corporate security investigations.

Portable Forensic Evidence Kit

Create a portable forensic evidence kit for corporate security investigations.

Submission Instructions:
Be sure to include all items that you will need to investigate a computer incident. Create a portable forensic evidence kit for corporate security investigations. Be sure to include all items that you will need to investigate a computer incident. You can use “pre-packaged” kits if they are available on the internet – if you choose to do so, please explain why you chose the kit.