Stratford University Cyber Criminal and Laws Addressing Cyber Crime Paper

Other

Part 1 (300 words) with one recent online reference

  • Is it ethical for universities/training schools to teach hacking techniques?
  • Are companies such as (Apple/Google/Microsoft) that are spying on us are intruders?

Part 2 (7 to 9 Pages) please includes charts to explain the situations.

First, investigate the basics of cyber crime, what is it and how does it work.

Second, investigate legal issues surrounding cyber crime.This will include what laws address which cyber issue.

Task 4: Analysis of Case Study on Cyber Crime for the Company:The company has experienced a number of attempts to hack into their systems, introduce malware, and conduct other espionage in order to gain access to secret product information.

TransManuCo believes that economic or industrial espionage has taken place to gather information about the company, first to discredit it, but also to steal intellectual property and ongoing research. It is also concerned that attackers have attempted to obtain operational information, such as datasets on clients, pricing, sales, marketing, research and development, policies, prospective bids, planning or marketing strategies or the changing compositions and locations of production.In at least two cases attempts were made to sabotage their systems though malware.The CEO now believes that there is someone on the inside who is assisting outside attackers and would like to take steps to have it formally investigated and prosecuted.

Analyze the episodes in this case including:

  • A brief discussion of what the issue or threat is and how it could affect the company
  • What cyber security laws or compliance standards are affected
  • What actions the company should take to mitigate the issue or decrease the potential threat
  • Cite your sources in APA from reputable reference materials

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *