What types of legislation has been enacted in the united


Conduct an internet search on hacking and identify specific examples of hacking that support the elements in the textbook. Discuss some of the methods and intricacies of hacking and give an explanation of what was compromised and how the threat was discovered. What are your thoughts on hacking and its subculture?

For your initial response please respond using some critical thought and a comprehensive response. Once you post your initial response make sure that you respond to a fellow classmate later in the unit with a creative rebuttal.

Please include the name of the person or question to which you are replying in the subject line. For example, "Tom's response to Susan's comment"

Upon completion of this unit, students should be able to:

1. Examine the function of information security management and how it plays a role in assessing vulnerabilities to critical information.

2. Analyze various information protection strategies and how these can play a role in the prevention of cybercrimes.

3. Outline strategies for safeguarding information including the protection strategies of physical security, administrative controls, and logical controls.

Questions to Consider

1. What types of information assets are used by organizations?

2. What types of information security tools and strategies do organizations use to secure their information assets?

3. What types of legislation has been enacted in the United States to assist with information security and what policies have resulted?

4. What is communication security? What is computer security? How are communication and computer security related?

5. What are the various types of cybercrime that exist?

6. What are the challenges associated with maintaining computer security?

7. What computer protection strategies and policies have been suggested and enacted?

8. What additional research and development is needed in the area of cyber security?

Learning Activities (Non-Graded)

1. Think about the various organizations in your community that process a lot of information. Pick one organization and conduct an INFOSEC risk assessment and analysis. You can search the internet for ideas about what specific criteria are assessed, instructions about how the assessments and analyses are conducted, and examples of the finished product. Were there any identified risks that surprised you?

Were there risks that you expected to find that you did not?

2. As a continuation of activity #1, brainstorm about the information protection strategies that you would utilize to protect the organization's information assets. What control strategies would you use? What information security legislation is relevant and what related policies would you implement? How would you ensure personnel security associated with the organization's information assets?

3. As a continuation of activity #2, select one of the current hacking examples and explore the computer protection strategies that were implemented, should have been implemented, and will need to be implemented in the future. Are any of Carroll's 10 strategies applicable?

What type of security research is needed and what types of strategies, policies and/or programs should be developed?

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: What types of legislation has been enacted in the united
Reference No:- TGS01621428

Now Priced at $10 (50% Discount)

Recommended (96%)

Rated (4.8/5)