Please provide a one page answer on each of the following questions: /0x4*
#1. Identify and describe some of the malware employed by terrorists, hacktivists, corporate spies, criminals and pleasure seekers.
#2. Discuss the justifications used by terrorists to maximize ideological appeal.
#3. Distinguish between probable cause and reasonable suspicion in regards to the Fourth Amendment.
#4. Analyze the area that should be documented in a forensic investigation. What, in your opinion, makes documentation the most important aspect of forensic science?
Text book: Computer Forensics and Cyber Crime: An Introduction
Marjie T. Britz, 2013
Pearson