Computer Investigations

A response to the WIIFM Activity
created by Mamdouh (@Mamdouh Mina)

Number of views: 343

Tags: , , , , , , ,


In my Investigation course, we work on the WIIFM, but explaining the type of investigations and all the tools we use to investigate and collect data from various sources, the internet, computers, mobile phones…etc.

One of the best activities that the student like to do is to investigate themselves and discover all the information that is “out there” about them, then from the WIIFM we discuss how that information that is “out there” can impact their life and future.

For example, what would a picture of a “very, very good weekend with very limited self-control” means for a potential employer and we discuss how easy or difficult or even if it is possible to remove that moment of indiscretion.

I then ask them to summarize using Gibbs’s reflective cycle report and calculate their chance of landing that presages cybersecurity position.

 

Example for "Computer Investigations":
https://bank.ecampusontario.ca/author/Mamdouh%20Mina