Week 4 – Cyber Security

1. Identify and describe four ways in which the privacy threats posed by cybertechnology differ from those posed by earlier technologies? 2. Can a person claim privacy rights when they use social networking sites such as Facebook and Twitter? Why is this difficult to define?  Can there be such a thing a privacy on the … Read more

Developing the Corporate Strategy for Information Security Overview

  Week 4 Assignment – Developing the Corporate Strategy for Information SecurityOverview Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will … Read more

Examine Real-World Implementations of U.S. Compliance Laws

 Purpose Compliance is important because it is the act of following laws, rules, and regulations that apply to an organization.  For an organization to be compliant it involves following laws and regulations by interpreting them so that policies and procedures can be defined.  By you researching some of the various real world standards and laws … Read more

Country Analysis:

 .Country Analysis: Write a briefing paper on the cyber threats facing a particular nation. The analysis will need to take into account historical and current enemies, the nation’s dependence on cyber, the level of sophistication of its cyber defense, and the level of sophistication of its adversaries. The discussion must be fact-based, logical, and analytical.  … Read more

Week 3 – Assignment

Instructions In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research … Read more

Week 3 – Cyber Security

1. Why do many in the computer community oppose the use of “hacker” to describe cybercriminals? Can a meaningful distinction be drawn between hacking and cracking? What kind of hacking can be justified on either legal or ethical grounds? 2. Research the Pirate Bay Trial: Guilty Verdict.  https://www.theguardian.com/technology/2009/apr/17/the-pirate-bay-trial-guilty-verdict What implications does the conviction of the … Read more

Assignment 2

Instructions The assignment must be a minimum of 3-full pages in length with a minimum of 3-outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday. 1) Research the United States Office of Personnel Management (OPM) incident announced in July 2015. … Read more

Week 2 cyber

450+ words 1. What is the Electronic Communications Privacy Act (ECPA) of 1986?  Please use outside resources to assist with your answer. 2. Research the United States v. Councilman case. Why was this case important to the history of the Electronic Communications Privacy Act? 3. Research a recent case of identity theft. Please explain the … Read more

Communicating Technology Concepts to Business Professionals

 Congratulations!  This week, your internship rotation takes you to the company’s IT Department where you’ve been asked to help prepare a short presentation for one of the company’s Brown Bag Lunch training events. This training event will be attended primarily by business professionals who have familiarity with information technology but at a very high level; … Read more

Research Report #1: Data Breach Incident Analysis & Report

   Scenario Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors found that the majority of PBI’s operating units did not have specific plans in place to address data breaches and, in general, the company was deemed “not … Read more