30 likes | 62 Vues
CMGT 245 Week 2 Individual Cybersecurity Law Review//tutorfortune.com<br><br>Click on below link to buy<br>https://tutorfortune.com/products/cmgt-245-week-2-individual-cybersecurity-law-review<br><br>CMGT 245 Week 2 Individual: Cybersecurity Law Review<br> <br><br>Resources:<br><br><br><br>The u201cAPA Paper Template: 100-299u201d posted in the Tutorials & Guides section of the Center for Writing Excellence website, paying specific attention to APA guidelines<br> <br><br> <br><br>The readings, videos, and Learning Team discussions from this week<br> <br><br> <br><br>Table 3-1, u201cKey U.S. Laws of Interest to Information Security Professionalsu201d of Principles of Information Security<br> <br><br> <br><br>The U.S. has in place many laws related to information security, computer security, and internet use. Many of these laws relate to information governance, accountability, and commercial liability. In addition, the issue of personal privacy is addressed in many of the laws that relate to specific industries, sectors, and types of information.<br><br>Write a 1- to 2-page paper using Microsoftu00ae Word that answers the following questions:<br><br> <br><br> <br><br> <br><br>For two laws from Table 3.1 in Principles of Information Security, state the overall intent of each law. For example what do the U.S. Police and Justice Act and the Computer Fraud and Abuse Act of the U.K. do?<br> <br><br> <br><br>Using a browser and search engine, determine the general number of cases/complaints that have been filed based on each of the laws listed below: <br><br> <br><br>Computer Fraud and Abuse Act<br> <br><br> <br><br>National Information Infrastructure Protection Act<br> <br><br> <br><br>Sarbanes-Oxley Act<br> <br><br><br>Having reviewed these laws and cases/complaints associated with them, completely answer each of the following: <br><br><br><br>Which of these laws seemed more frequently enforced? Which of these laws have resulted in a large financial impact to a business? Which of these have imposed a strict punitive damage (e.g., someone being convicted of fraud)?<br> <br><br> <br><br>According to your answer above, what infrastructural or cyber domain sector or assets are being protected by such enforcement?<br> <br><br> <br><br>Accurately explain if the ethical confidentiality of all private information is assured by the three laws<br> <br><br>Based on your Learning Team discussion, list at least two conflicts faced by U.S. cloud service providers when providing services globally.<br> <br><br> <br><br>Use APA citation formatting in all work submission. Follow rules of grammar and usage, including spelling and punctuation.<br><br>Submit your assignment using the Assignment Files tab.<br> <br>CMGT 245 Week 2 Individual: Cybersecurity Law Review<br>Click on below link to buy<br>https://tutorfortune.com/products/cmgt-245-week-2-individual-cybersecurity-law-review<br>
E N D
CMGT 245 Week 2 Individual Cybersecurity Law Review//tutorfortune.com Click on below link to buy https://tutorfortune.com/products/cmgt-245-week-2-individual-cybersecurity-law-review C MG T 2 4 5 We e k 2 I n d i v i d u a l : C y b e r s e c u r i t y L a w R e v i e w R e s o u r c e s : T h e “ A P A P a p e r T e mp l a t e : 1 0 0 - 2 9 9 ” p o s t e d i n t h e T u t o r i a l s & G u i d e s s e c t i o n o f t h e C e n t e r f o r Wr i t i n g E x c e l l e n c e w e b s i t e , p a y i n g s p e c i fi c a t t e n t i o n t o A P A g u i d e l i n e s T h e r e a d i n g s , v i d e o s , a n d L e a r n i n g T e a m d i s c u s s i o n s f r o m t h i s w e e k T a b l e 3 - 1 , “ K e y U . S . L a w s o f I n t e r e s t t o I n f o r ma t i o n S e c u r i t y P r o f e s s i o n a l s ” o f P r i n c i p l e s o f I n f o r ma t i o n S e c u r i t y T h e U . S . h a s i n p l a c e ma n y l a w s r e l a t e d t o i n f o r ma t i o n s e c u r i t y , c o mp u t e r s e c u r i t y , a n d i n t e r n e t u s e . Ma n y o f t h e s e l a w s r e l a t e t o i n f o r ma t i o n g o v e r n a n c e , a c c o u n t a b i l i t y , a n d c o mme r c i a l l i a b i l i t y . I n a d d i t i o n , t h e i s s u e o f p e r s o n a l p r i v a c y i s a d d r e s s e d i n ma n y o f t h e l a w s t h a t r e l a t e t o s p e c i fi c i n d u s t r i e s , s e c t o r s , a n d t y p e s o f i n f o r ma t i o n . Wr i t e a 1 - t o 2 - p a g e p a p e r u s i n g Mi c r o s o f t ® Wo r d t h a t a n s w e r s t h e f o l l o w i n g q u e s t i o n s : F o r t w o l a w s f r o m T a b l e 3 . 1 i n P r i n c i p l e s o f I n f o r ma t i o n S e c u r i t y , s t a t e t h e o v e r a l l i n t e n t o f e a c h l a w . F o r e x a mp l e w h a t d o t h e U . S . P o l i c e a n d J u s t i c e A c t a n d t h e C o mp u t e r F r a u d a n d A b u s e A c t o f t h e U . K . d o ? U s i n g a b r o w s e r a n d s e a r c h e n g i n e , d e t e r mi n e t h e g e n e r a l n u mb e r o f c a s e s / c o mp l a i n t s t h a t h a v e b e e n fi l e d
b a s e d o n e a c h o f t h e l a w s l i s t e d b e l o w : C o mp u t e r F r a u d a n d A b u s e A c t N a t i o n a l I n f o r ma t i o n I n f r a s t r u c t u r e P r o t e c t i o n A c t S a r b a n e s - O x l e y A c t H a v i n g r e v i e w e d t h e s e l a w s a n d c a s e s / c o mp l a i n t s a s s o c i a t e d w i t h t h e m, c o mp l e t e l y a n s w e r e a c h o f t h e f o l l o w i n g : Wh i c h o f t h e s e l a w s s e e me d mo r e f r e q u e n t l y e n f o r c e d ? Wh i c h o f t h e s e l a w s h a v e r e s u l t e d i n a l a r g e fi n a n c i a l i mp a c t t o a b u s i n e s s ? Wh i c h o f t h e s e h a v e i mp o s e d a s t r i c t p u n i t i v e d a ma g e ( e . g . , s o me o n e b e i n g c o n v i c t e d o f f r a u d ) ? A c c o r d i n g t o y o u r a n s w e r a b o v e , w h a t i n f r a s t r u c t u r a l o r c y b e r d o ma i n s e c t o r o r a s s e t s a r e b e i n g p r o t e c t e d b y s u c h e n f o r c e me n t ? A c c u r a t e l y e x p l a i n i f t h e e t h i c a l c o n fi d e n t i a l i t y o f a l l p r i v a t e i n f o r ma t i o n i s a s s u r e d b y t h e t h r e e l a w s B a s e d o n y o u r L e a r n i n g T e a m d i s c u s s i o n , l i s t a t l e a s t t w o c o n fl i c t s f a c e d b y U . S . c l o u d s e r v i c e p r o v i d e r s w h e n p r o v i d i n g s e r v i c e s g l o b a l l y . U s e A P A c i t a t i o n f o r ma t t i n g i n a l l w o r k s u b mi s s i o n . F o l l o w r u l e s o f g r a mma r a n d u s a g e , i n c l u d i n g s p e l l i n g a n d p u n c t u a t i o n . S u b mi t y o u r a s s i g n me n t u s i n g t h e A s s i g n me n t F i l e s t a b .
C MG T 2 4 5 We e k 2 I n d i v i d u a l : C y b e r s e c u r i t y L a w R e v i e w Click on below link to buy https://tutorfortune.com/products/cmgt-245-week-2-individual-cybersecurity-law-review