What are the greatest cyber crime threats

Assignment Help Other Subject
Reference no: EM132325350

Assignment: Scenario: You have been an investigator for the St. Louis Police Department for many years. Recent surges in cyber crime have caused your police department to consider developing a cyber crime task force to combat the rising number of cyber thefts in St. Louis County jurisdictions. The police commissioner recognizes that you are a top investigator and appoints you to lead the new cyber crime task force. The commissioner says to you "Build a cyber crime task force. Tell us [a] what the greatest cyber threats are, [b] what you need to establish a cyber crime task force, and [c] what legislation we should push for to stop these cyber crimes."

In eight to ten double-spaced pages, (excluding the title page and reference page) develop a cyber crime task force plan for St. Louis County in Missouri. Use research from the Internet and the Ashford Online Library to identify cyber crime investigative strategies and task force developments around the country. Identify techniques, tools, and organizational structures used by other law enforcement agencies to determine which ones will be most useful for your task force. Use the following outline to produce your plan for the St. Louis police commissioner:

1. Executive Summary of Cyber Crime Task Force Plan (one paragraph)

2. Cyber crime threats in St. Louis County

• What are the greatest cyber crime threats that St. Louis County is currently facing or likely to face in the near future? (Use data and statistics from outside the course text.)

• Which three types of cyber crime will be the top priorities for the task force?

3. Cyber Crime Task Force Structure

• Which organizational structure will the task force utilize?

• What personnel and skills will the task force need to investigate the top three cyber threats?

• Which federal agencies in the St. Louis area should the task force develop relationships with in order to be effective?

4. Cyber Crime Task Force Equipment

• Which types of equipment, technologies, and items should the police commissioner acquire for the Cyber Crime Task Force?

• What is needed to develop a cyber crime lab capable of performing cyber forensics?

• Why are these systems important?

5. Cyber Crime Legislation

• In order to pursue cyber criminals, what legislation and provisions should be developed in St. Louis County to increase local law enforcement capacity for investigating cyber crime?

• Where should these laws be passed?

6. Conclusion

• In addition to those identified above, what other factors should be considered in building a Cyber Crime Task Force?

Students must refer to and cite cyber crime task force best practices used by federal, state and local law enforcement around the country to inform their Cyber Crime Task Force Plan. In addition to the course text, you must use at least five scholarly sources to support your thesis. At least two of these sources must come from the Ashford Online Library. All sources must be properly cited, and the Final Paper must be formatted according to APA style. If you would like to refer to APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on the left navigation toolbar, in your online course.

Writing the Final Paper:

The Final Paper:

1. Must be eight to ten double-spaced pages in length and formatted according to APA style as outlined in the approved APA style guide.

2. Must include a cover page that includes:

• Title of paper

• Student's name

• Course name and number

• Instructor's name

• Date submitted

3. Must address the topic of the paper with critical thought.

4. Must use a minimum of five (5) scholarly resources in addition to the course text, two from the Ashford Online Library.

5. Must include an introductory paragraph with a succinct thesis statement.

6. Must conclude with a restatement of the thesis and a conclusion paragraph.

7. Must use APA (6th ed.) style as outlined in the approved APA style guide to document all sources.

8. Must include a Reference Page that is completed according to APA (6th ed.) style as outlined in the approved APA style guide.

Reference no: EM132325350

Questions Cloud

Create the standard three views by freehand rough sketching : Using the grid to estimate the size of the parts, create the standard three views by freehand rough sketching. Given the Orthographic Top view, Front view.
What was life really like for the early frontiersmen : Two very common names we hear when discussing life on the Early Tennessee frontier, which included parts of North Carolina and Kentucky, are Davy Crockett.
How could a research project help you explore your interests : In an initial post of at least 250-300 words, state the theme that interests you and explain how or why it relates to the topic you wish to examine.
What have other philosophers said about the work : Write a review of what you read. Describe what the work is about and give your true personal reflections on it. Here are some questions you might consider.
What are the greatest cyber crime threats : You have been an investigator for the St. Louis Police Department for many years. Recent surges in cyber crime have caused your police department to consider.
Create a query to find one type of device : In today's world, most college students will own at least one electronic device, such as a cell phone. Many students have multiple electronic devices.
What sacrifices would a business have to make : You may have noticed the emphasis on preparedness. While society expects a business to be prepared for disasters and to recover using its own resources.
How situational awareness is a driver for response controls : Much of the security efforts of the past have been centered around prevention and protection. The increasing sophistication of cyber attacks have shown.
Solve the issues related to current work environment : If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your.

Reviews

Write a Review

Other Subject Questions & Answers

  Discuss a cost-benefit and cost-effective analysis

Discuss a cost-benefit and cost-effective analysis of the proposed assessment and contingency plan. Justify your rationale.

  How the patient moved through the healthcare delivery system

Explain how the patient moved through the healthcare delivery system.

  Studying whether women find superheros attractive

A researcher is interested in studying whether women find superheros attractive. She has them rate some men on a scale of 1 (no thanks) to 10 (yes please) before and after they become superheroes. Conduct a two-tailed test at alpha= 0.05 to determ..

  Explain organizational theories evidenced in the case

Explain organizational theories evidenced in the case. Analyze how Texas Health Harris Methodist-Cleburne is a learning organization.

  Define eriksons concepts of mal-development and malignancy

Define Erikson's concepts of mal-development and malignancy.  Why are these bad for your personality?  How can these conditions be corrected (be specific)

  What is the specific heat of the turpentine?

what is the specific heat of the turpentine?

  What do you see as your strengths and weaknesses

Do you agree with the results of your assessment? Based on the results of your assessment, what do you see as your strengths and weaknesses? How might your personality type influence your job performance?

  Describe social workers job activities and professional role

Describe the social worker's job activities and professional roles. Explain what brought the social worker to the field and their work history.

  What is your opinion on sex-segregated public bathrooms

What is your opinion on sex-segregated public bathrooms? Are you for or against them? Give your opinion and the reasons why you feel that way.

  Description of the health history

POST 1-2 PAGES SOAP NOTE ON: A description of the health history you would need to collect from the patient in the case study to which you were assigned. Explain what physical exams and diagnostic tests would be appropriate and how the results..

  Discussion post to fulfil the case requirement of syllabus

Discussion post to fulfil the case requirement of the syllabus. Describe how you do or could use operations security in your current job.

  Identify and discuss the rights of victims or defendants

What did each do right or wrong in this case? What rights did the victim or the defendants have that were not exercised in this case?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd