This website uses cookies to ensure you have the best experience. Learn more

Cyber Law Essay

656 words - 3 pages

Assignment 2
Chapter 3

1. Name and Describe two (2) U.S. based compliance laws that exist. 

Federal Information Security Management Act- This act was passed in 2002 as part of the title 3 of the E-Government Act. Its purpose is to ensure that federal agencies protect their data. It gives specific responsibilities for federal agencies. They are responsible for protecting the system and data, complying with all elements of FISMA and integrating security in all processes.

Gramm-Leach Bliley Act also known as the Financial Services Modernization Act of 1999. This act protects your private financial information from being sold to other business. GLBA also offer protection against the practice of obtaining personal information through false pretenses. There are two parts that pertain to IT security which is Financial Privacy Rule which requires companies to notify there customers about there privacy practice and Safeguard rule which means a company ...view middle of the document...

Level 1 is the initial. This level is referred to as the as needed level.

Level 2 is managed. This level is when the organizations regulate out of feeling instead of having a plan. The organization knows they need security and have risk it’s just not a plan in place.

Level 3 is defined. The organization has a security policy in place and some security awareness.

Level 4 is quantitatively managed. The organization performs risk and vulnerability assessment to ensure their policies and standards in place works. The company controls the security process.

Level 5 is optimized. This level focuses on improving the process. The organization continually monitors the security and they have security process in place throughout the company.

Chapter 4

1. What is Scope and why is it important to a Risk Management Project?

A scope recognizes the limitations of a plan. The boundaries could be a single system or an entire organization without these limitations the plan can get out of whack.

2. What is a Cost Benefit Analysis and why is it important? 

A cost benefit analysis is a relative assessment of all benefits you anticipate from your project from start to finish. The cost benefits analysis is important because it will help you decide if you want to take on that project or if you have to choose between several which, will you take on. This will also help you determine what your objective is for the project and lastly help you figure out what resources will be needed for the project.

3. Name and describe the three (3) types of project management charts.

The types of project management charts are; Gantt chart, which is a chart that shows the schedule of a project. This chart is mainly used for project management and is more detailed then the milestone plan chart. This chart will show you the status and progress of your projects. Next you have the milestone plan chart, which represents the major milestones of the project. For an example this will keep track keep track when each milestone (project) is completed. It will also track the start and ending date of the project. Lastly, critical path chart shows all the projects that must be completed in time. If any particular task is delayed this chart will delay the whole project.

Other Essays Like Cyber Law

Cyber Terrorism Essay

787 words - 4 pages prosecutions but does not themselves constitute cyber crime is cyber-vigilantism. In the conventional world, cyber-vigilantism (using a computer to conduct acts of vigilantism) the cyberspace versions of vigilantism is technically not designated as a crime, therefore known to be technical non-offensive. However, even though the law has never recognized a crime called "vigilantism" vigilantes are sometimes prosecuted for other recognized offenses such as

Rule of Law Paper

695 words - 3 pages conscious of their wrong use and to make them use the machine for its appropriate uses, laws are formulated and implemented. For the computer, cyber law was implemented to regulate cybercrime and inform people on the different types of computer uses that are viewed as legal and as crimes. One of the most commonly violated cyber law is the United States anti- cyber-stalking law, which is found at section 223 of the United States constitution

"Cyber Bullying

760 words - 4 pages Dixon1 Monica Dixon Instructor Scarlett Hill ENGL 1301-2203 10 April 2012 “Cyber bullying Current Issues” Cyber bullying is a problem that is growing rapidly, current estimates indicate that at least 20-35% of children and adolescents experience cyber bullying. This paper will guide professionals as they advise parents in navigating the world of cyber bullying. The information given was research on parenting, child development and

Cyber Security

2577 words - 11 pages must to com pliment the current and potential government action. Many security experts note that it should be obvious that business and industry will need to share infonnation witl1one another and the government to increase cyber security lO (Almonod, 2012). Requiring them to do so by law allows some prolcction for lia bility and helps lo mitigate risks from cyber aHack (Almonod , 2012). Oovermnenl and indust ry leaders need to assign

Cyber Crime

1744 words - 7 pages Crime happens every day around the world. Although one crime in particular has had a great amount of growth, this crime has been classified as “Cyber Crime”. This type of crime was first acknowledged in the mid 1980’s and is now committed from millions of computers, cell phones, and other pieces of technology every day. It has also had a significant amount of growth over the past decade due to the increase of internet users and the rapid

Cyber-Communism: the New Threat in the New Millennium

1404 words - 6 pages My expedition into cyber-communism began when I read Brock Meeks' "Hackers Stumble Toward Legitimacy"[1]. The article addressed a recent hackers' convention. Interestingly, the keynote speaker was Eric Boucher[2] (alias Jello Biafra[3]), a rock star with no technical background. Numerous questions ensue. Who is Eric Boucher (alias Jello Biafra)? What does he believe? More importantly, why schedule someone with no technical background to

Cyber Warfare Will Require a Rma

1774 words - 8 pages utilization of cyber warfare in concert with Russian conventional forces, Special Forces, and psychological operations highlights the criticality of expediting the instutionaliztion of cyber warfare innovations into US Army doctrine, training, and force development. Rick Atkinson wrote in _An Army at Dawn_ (2002) that "it is pardonable to be defeated...but unpardonable to be surprised." And von Clausewitz (_On War_, 1832) roughly stated that

On the Offensive

1043 words - 5 pages Cyberwar. Retrieved from Armed Forces Journal: Gorman, J. E. (2011, July 15). Cyberwar Plan Has New Focus on Deterrence. Retrieved from The Wall Street Journal: O'Connell, M. E. (2012). Cyber Security without Cyber War. Retrieved from Journal Of Conflict & Security Law:

Cybersecurity Standards: a Case Study on Malaysian Banking Sector

1977 words - 8 pages general law on criminal offenses in Malaysia -- Because most cybercrimes are traditional by nature, instead ICT is used as a medium to commit criminal acts. Other laws that, while not exactly amount to being a Cyber Law, are in fact indirectly applicable to the cyberspace as well such as the; a. Security Offences (Special Measures) Act, b. Defamation Act, c. Sedition Act, d. Evidence Act 114A. Copyright © 2013 CyberSecurity Malaysia

Cyber Bullying

1543 words - 7 pages are taking strong steps aimed at curbing cyber abuse. The article, Cyber bullying crack down, is about a kid named Jamey who was bullied online and was so bullied he committed suicide and things the government and law and mostly do. As stated in the article Cyber bullying crackdown “our laws are not keeping place with technology”, Senator Klein says. This shows the government and lawmakers have the responsibility to prevent cyber bullying

Understanding Stalking in the Virtual World

2991 words - 12 pages knowledgeable sources on this subject, the agency felt they could do nothing more then provide a scant definition of online stalking to victims. They also felt they could not be of assistance to law enforcement professionals requesting tools to combat this crime. There is little doubt the number of reported cyber stalking cases will continue to grow as awareness of the subject continues to grow. Though experts in the fields of criminology

Related Papers

Cyber Crime Trends Essay

1821 words - 8 pages science because it is about generalizations and knowing the types of individuals who will commit specific criminal offenses. The typical cyber criminal is an individual who possesses some measure of technical knowledge. This individual will have a total disregard for the law or any rationalizations about why specific law(s) are invalid and should not apply (Shinder, 2010). The cyber criminal is an individual that may have a high tolerance for risk and

Living In The Age Of Cyber Attacks And Cyber Warfare

2381 words - 10 pages ,97(2), 79-81. Retrieved from Droege, C. (2013). Get off my cloud: Cyber warfare, international humanitarian law, and the protection of civilians. International Review Of The Red Cross, 94(886), 533-578. doi:10.1017/S1816383113000246 Geers, K. (2008). Cyberspace and the changing nature of warfare. SC Magazine, 27. Haggard, S

Cyber Crime Essay

558 words - 3 pages them on regular basis. Besides we should activate firewall, use antivirus and block spyware attacks. Cyber crime is a multimillionaire problem which has to be tackling effectively not only by the official but also by the users by cooperation with the law.

Network Security Essay