Describe the computer crimes and legal implications

Assignment Help Computer Network Security
Reference no: EM132002944

In this assignment, you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project, Week 3 Project, and Week 4 Project.

Remember to review the scenario document for the company profile and overall security objectives. Modify and correct the plan you created for Week 4 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week.

Use Track Changes or color code your changes and additions so that the changes are easy to identify.

In this week's assignment, you will complete the final security report for ABC, Inc. by considering fault tolerance mechanisms and incorporating a policy and redress system for employees regarding computer crimes and computer use within the organization.

Using the South University Online Library or the Internet, research about the following:

Mechanisms available for fault tolerance in a system

Computer crimes and legal implications for employees

Dispute resolution mechanisms when computer crimes occur Using your project report from Week 4 Project, complete the following tasks by adding 3 to 5 pages to the existing report:

Modify the plan created in Week 4 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week.

Color code your changes to the report so that they are easy to identify.

Create a section of the report that describes the computer crimes and legal implications for the employees. This should include a point of contact for disputes, the process of appeal, and levels of severity and consequence.

This should just be an overview in general terms rather than a complete policy declaration.

Recommend a fault-tolerance mechanism or a combination of fault-tolerance mechanisms that needs to be implemented in the organization to ensure uninterrupted business.

What elements of the business need to be continuous for the business to survive? Justify your answer.

Make sure all prior areas of security for ABC Inc. have been sufficiently addressed along with implementation and verification details. Be sure you have referenced external sources for up-to-date information and comprehensive recommendations. This can include library and Internet research.

Describe the implementation process and timeline for your recommendations.

Try to give as reasonable a timeline as possible and explain your plan. Expand the section of your report for verifying the implementation of the security recommendations for this week.

Identify what is being tested for each verification activity. This should include testing activities to make sure the security system is working properly.

Attachment:- Report.rar

Verified Expert

This section analyses computer crime generally and also some of the computer crime legal implications for employees. Additionally, the section further describes some of the recommended fault tolerance mechanisms for ABC and the effectiveness of the mechanisms. It also presents the timelines for installation of the recommended system and their testing activities.

Reference no: EM132002944

Questions Cloud

Statement in the program could access : Technically, it is possible for C++ programmers to declare class data as public, meaning any statement in the program could access and change the data directly.
How much should a couple deposit : How much should a couple deposit at the end of each month into an investing plan that pays 7.5%, compounded monthly, so that they will have 800,000 in 30 years?
Example of when a void function would be appropriate : List at least one specific example of when a void function would be appropriate and one specific example of when a non-void function would be appropriate.
What should the yearly savings be to achieve objectives : Mr. Smith retires in exactly 20 years. At that time he desires to have accumulated enough money so that he can consume $100,000 per year for perpetuity.
Describe the computer crimes and legal implications : Describe the implementation process and timeline for your recommendations - Identify what is being tested for each verification activity
Social security numbers for processing : Determine whether you would use a struct or an array to store the social security numbers for processing in the program. Provide a rationale for your response.
Difference between a reference vs a static variable : What is the difference between a Reference vs a Static Variable? When would you use either and why?
How much money will the daughter have : Mr. Blochirt is creating a college investment fund for his daughter. He will put in $1,000 per year for the next 5 years starting one year from now and expects.
How much would it cost her to buy the annuity today : Because your mother is about to retire, she wants to buy an annuity that will provide her with $75,000 of income a year for 20 years.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write the conclusion to the information security policy

Write the conclusion to the Information Security Policy? Write the Network Security Policy section of the Information Security Policy.

  Identify any security controls that need to be implemented

The plan should cover all layers of the OSI model. Identify any security controls that need to be implemented to assist in mitigating risks.

  An isp has received a block

An ISP has received a block of addresses in which the prefix length (n = 24). The ISP needs to make 8 sub-nets (sub-blocks) of equal sizes from this block. What is the prefix of each sub-block?

  Describe policies standards processes and guidelines

Describe Policies, Standards, Processes and Guidelines. Discuss the relationship between Controls and Audits. The Sarbanes-Oxley Act. The different implications Regulations have on Government and non-Government entities.

  What are new types of messages added compared to snmpv-one

What are the new types of messages added compared to SNMPv1? Regarding table expansion, what is the difference between createAndGo and createAndWait RowStatus?

  Write an authenticated key establishment protocol

Write an authenticated key establishment protocol for A and B to establish a session key - Write a concrete private handshake by using a zero-knowledge proof technique.

  Securing system using iptable firewall

You have to discuss the main use, limitations, and possible security holes of your firewall and write it in your report - discuss the advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your ..

  Compare distance vector routing with link state routing

Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?

  Assessment of the risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information (loss of confidentiality).

  State some threats that result from a process running

State some threats that result from a process running with administrator or root privileges on a system.

  Presentation on wireless networking

presentation on wireless networking

  Write a two pages paper on basic web security

Write a 2 pages paper on basic web security including how to properly configure Microsoft's Baseline Security and how to secure Window's Web Server.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd