Legislatures with thought-out position for congresswoman

Assignment Help Basic Computer Science
Reference no: EM133295306

Consider for a moment that the Senate pushed forward a bill in the United States Congress to combat illicit online services and anonymizing services. You are a staffer for a US Congresswoman who has asked you to look at the bill and consider the pros and cons of supporting or opposing it. This bill would do the following:

1. Require VPN services to keep logs that could be used to correlate activity to a specific user

2. Require web hosting companies to also keep logs and customer information.

What effect would such a bill have on cybersecurity, privacy, investigations, etc? The present legislatures with a thought-out position for the congresswoman and consider controls you might put in place or suggestions to amend the bill. Include themes, concepts, and ideas.

Reference no: EM133295306

Questions Cloud

Information collected by government : Provide three examples from readings or online search where information collected by a government for one purpose has been used for entirely different purpose.
Calculate the entropy : Calculate the Entropy of a 10-character Password with the characteristics.
Application is free from security vulnerabilities : Discuss how it can be effective in providing protection or how it can be used to provide assurance that the application is free from security vulnerabilities.
Initial association when victim client transmits : What kind of physical device is an evil twin access point? What does the evil twin make after initial association when the victim client transmits?
Legislatures with thought-out position for congresswoman : What effect would such a bill have on cybersecurity, privacy, investigations, etc? The present legislatures with a thought-out position for the congresswoman
About data-classifying data and risks involving data : We learn a lot about data, classifying data, risks involving data, and policies that apply to data.
Proper data governance policies : Discuss in detail two issues that can happen in a hospital without proper data governance policies.
Information security or protecting consumer data : What standards are there for information security or protecting consumer data? Are the standards easily adoptable by companies?
Logical security tools-supporting processes are implemented : Logical security tools and supporting processes are implemented and configured to restrict access to critical applications to authorized users only.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Information on policy requirements for government sector

National Institute of Standards and Technology (NIST) and National Security Agency (NSA) Web sites for information on policy requirements for government sector

  Modeling an emergency communication system

You are modeling an emergency communication system used to contact teachers in case inclement weather emergencies cause delayed openings or closures of the school. You may reach teachers by phone and/or email. The school must have at least one mea..

  Demonstrate critical awarenes-research theory and techniques

Demonstrate a critical awareness of previous research in an IT context - understanding of research theory and techniques.

  Satisfy all the pending requests

Starting from the current head position, what is the total distance (in cylinders) that the disk arm moves to satisfy all the pending requests for the following

  Cryptography discussion

POR 343-Portland Community College-Cryptography is the art of ensuring client information by changing it into an unreadable structure, called the ciphertext.

  The lifeblood of every business organization

According to Franks and Smallwood, information has become the lifeblood of every business organization, and that an increasing volume of information

  What are the privacy issues with data mining

Define data mining. Why are there many names and definitions for data mining?

  Apply the principles of operational excellence

Any company, regardless of size, product or service, is one to which you can apply the principles of operational excellence.

  Public key encryption become popular

Why and when did public key encryption become popular?

  Analysis in strategic risk management

How does efficient frontier analysis (EFA) differ from other forms of complex risk assessment techniques?

  Project manager to build a trust among stakeholders

1. Why it is critical for a project manager to build a trust among stakeholders - how this associates to the PM leadership qualities?

  Likelihood or severity of a cyber attack

Thus, it is almost impossible for an insurance company to set the level of premiums for a cyber insurance policy. Do you agree?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd