Ethics, law and cybersecurity question

Assignment Help Computer Network Security
Reference no: EM132379108

Assignment: Ethics, Law And Cybersecurity

1. Consumer surveys have suggested that many Internet users are concerned about losing bits of their privacy when they are engaged in online activities. In fact, many Internet users identify privacy as their number one concern, ahead of concerns about ease of use, security, cost, spam, and so forth.

(a) Do only individuals who elect to use the Internet have reason to be concerned about losing their privacy?

(b) Should those who have never even used a computer also worry?

(c) Lastly, are issues of privacy a major concern in Canada (you must provide an appropriate reference that supports your answer to this question, i.e., url, news article, etc.)? Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (knowledge)

2. In the days and weeks immediately following the tragic events of September 11, 2001, some political leaders claimed that "extraordinary times call for extraordinary measures"; in times of war, basic civil liberties and freedoms, such as privacy, need to be severely restricted for the sake of national security and safety. Perhaps, as a nation, the value that we have traditionally attached to privacy has diminished significantly since then. Consider that the majority of American citizens strongly supported the USA (United and Strengthening America) PATRIOT (Provide Appropriate Tools Required to Intercept and Obstruct Terrorism) Act, which passed by an overwhelming margin in both houses of Congress and was enacted into law on October 21, 2001. Privacy advocates have since expressed their concerns about this act, noting that it might have gone too far in eroding basic civil liberties. Some critics also fear that certain provisions included in the act could easily be abused; for example, those in power could use those provisions to achieve controversial political ends under the convenient guise of national defense. Examine some of the details of USA PATRIOT Act

(a) Determine whether its measures are as extreme as its critics suggest.

(b) Are those measures consistent with the value of privacy, which Americans claim to embrace?

(c) Do privacy interests need to be reassessed, and possibly recalibrated, in light of recent attacks by and ongoing threats from terrorists?

(d) What similar acts or laws exist in the United Kingdom? Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (comprehension)

Reference no: EM132379108

Questions Cloud

How the retained earnings account has changed over past year : Calculate the following ratios for the most recent two years and comment on the results of your ratio analysis. How the Retained Earnings account has changed.
What should be the amount of deduction for salary expense : The salary of $20,000 owed to employees at the end of 2017 was paid in 2018. What should be the amount of the deduction for salary expense in 2017 and 2018?
Define how to organize the contents of it policy framework : In a minimum of 1000 words, write an APA formatted paper addressing which principles and concepts are important in the design of policy and how to organize.
What impact do income taxes have on the sales volume : What impact do income taxes have on the sales volume required to earn a desired after-tax profit? The response paper should be in APA format.
Ethics, law and cybersecurity question : Ethics, Law And Cybersecurity assignment help and assessment help - Consumer surveys have suggested that many Internet users are concerned about losing bits.
How important is developing an accurate wacc to output : How do we reflect risk in DCF modeling? What factors can be adjusted in the model inputs to represent a higher risk versus lower risk project?
Discuss pros and cons of stakeholder engagement : How stakeholder engagement affects IT projects. Describe stakeholder management. Discuss pros and cons of stakeholder engagement.
Emerging Threats Assignment Problem - Security Policies : Emerging Threats assignment help and solutions - What security policies will need to be built into your company's overall existing security program to ensure.
Challenges in attracting and retaining a workforce : You will write an essay on the key challenges in attracting and retaining a workforce in your selected sector - develop an argument applying that literature

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is the plaintext for the ciphertext 10000001

What is the ciphertext (in binary form) generated by the encryption of the character T (Please show your work.)

  What are some basic differences in the privacy rules

What are some basic differences in the privacy rules among the US, Asia and Europe? Do you believe they may be changed over time?

  Staff to maintain integrity of the network

Offsite storage like Cloud technology can allow access to all critical information without invests additional resource to maintain the storage solutions and the staff to maintain integrity of the network.

  Identity the elements of a security policy

In preparation of your review, you have been asked to identity the elements of a security policy and describe how those elements protect against such an attack.

  Describe in detail at least four types of system programs

Describe in detail at least four types of system program. Describe in detail advantage time-shared operating system has over a non-time-shared operating system.

  What is the single most important new technology

What is the single most important new technology that has affected digital forensics in the last five years and why?

  Identify the responsibilities of a project manager

Identify the responsibilities of a Project manager when participating in a real world project and define the role of management in projects, particularly from the view point of the practitioner as a member of the project team;

  Federal government regulates labels

The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

  What are strength for current and future of given app

What are strength for current and future of app (application to be used for smart phone like devices) in term of development. At least 2 paragraph with two in-text reference.

  Describe the key differences between a network-based attack

Describe the key differences between a network-based attack and client-based attack. Give some examples of each and determine which deserves the most attention at this point in time. Explain your reasoning.

  Describe the merits and demerits of other uses of this

in recent years the fcc and other bodies around the world have been removing spectrum dedicated to analog tv

  Identify and describe the organizational holdings at risk

ICT 205 CYBER SECURITY-KING’S OWN INSTITUTE-Australia-Identify and describe the potential security threats to the organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd