17 Mar You have been called back by the CISO to report your findings and pursue the next steps of your investigation. During your investigation it was discovered
You have been called back by the CISO to report your findings and pursue the next steps of your investigation. During your investigation it was discovered that the estranged husband of the CEO's executive staff assistant had compromised her system's account, which allowed him to access confidential documents including other employees' personally identifiable information. You have completed your forensics investigation and documented the findings in an incident report, and continue to maintain and secure evidence in the pursuit of criminal and civil charges.
Instructions
With the information ascertained during your investigation, and utilizing knowledge of network architectures and standards relevant to network investigations, write a 3-5 page paper responding to the points listed below. You may utilize the resources from your study this week to analyze appropriate U.S. Supreme Court cases, federal laws, and federal statutes.
- Analyze at least three of the significant U.S. Supreme Court cases focusing on digital crime and evidence. To support your work, reference the federal laws that were violated and the basis for the case (that is, summarize the case).
- Analyze at least three federal statutes governing electronic surveillance in a communications network that can be applied to this case. To support your work, refer to the statutes listed in the Electronic Communications Privacy Act (ECPA).
- Summarize the roles and responses of federal law enforcement agencies and any interagency partnerships concerning cybercrimes.
- Describe at least three factors that have limited the efforts of local law enforcement to identify and investigate cybercrime.
- Provide three sources to support your writing in addition to the textbook. Choose sources that are credible, relevant, and valid. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.
This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.
The specific course outcome associated with this assignment is:
- Evaluate the effectiveness of applications of cybersecurity in preventing crime and abuse.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.