Question 1:
Hefty Hardware Case Study
Read the Hefty Hardware Case Study on pages 76-79 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length.
Discussion Questions
1. What went wrong with the TUFS investment, and what can be done to prevent
these problems in the future?
2. What does Northern need to do to realize the benefits that were projected for TUFS?
3. How can Northern measure these benefits?
Note: Your initial post will be your answer to the Question and is to be 500 – 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.
Question 2:
After review Chapter 2 of the course text and reading other resources, Discuss the Four Critical Success Factors in Developing IT Strategy for Business Value
Note: Your initial post will be your answer to the Question and is to be 500 – 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.
Reference textbook for Question 1 & 2
§ McKeen, J. D., & Smith, H. A. (2015). IT strategy: Issues and practices (3rd ed.). Pearson. 
Question 3:
Search for a scholarly source on the topic of Heartbleed Vulnerability on Google Scholar (https://scholar.google.com/)  Summarize the article and discuss your opinion on the article.  Use APA formatting and be sure to cite your sources or references using APA Style.

Note: Your initial post will be your answer to the Question and is to be 500 – 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.
Question 4:
Memory forensics is an important form of cyber investigation that allows a digital investigator to identify unauthorized and unusual activity on a computer or server.  Research and summarize a memory imaging tool used in Windows memory forensics.
Note: Your initial post will be your answer to the Question and is to be 500 – 550 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.
Reference for Question 3 & $
Malin, Cameron, Casey, Eoghan, and Aquilina, James (2012). Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides. Syngress.