List the laws and regulations mentioned in the module.
Project 2 Start Here
The increase in cyberattacks has resulted in the need for more cybersecurity controls, which are reflected in both government regulations and private sector standards. Government and industry must continue to work together, leveraging expertise in all sectors, to develop guidance on the best approaches to implementing the best cybersecurity measures in organizations.
In this project, you will analyze the best known and earliest cybersecurity statute, the Computer Fraud and Abuse Act, 42 U.S.C. §1030, as well as similar state statutes, and suggest improvements to provide a basis for a cybersecurity compliance and standards approach. You will use your findings to redraft sections of the federal statute and prepare a memo for your organization to send to your member of Congress, for use in hearings regarding possible amendments to the CFAA.
This is the second of six sequential projects. There are 12 steps in this project. Begin by reviewing the project scenario, and then proceed to Step 1.
Project Scenario
As the chief information security officer known as the CISO [pronounced siss-so] for a trade association, part of your job is to monitor potential legislation that could affect your industry. You’ve been following attempts by legislators to amend the federal Computer Fraud and Abuse Act (CFAA), which made the news some years ago when Internet activist Aaron Swartz committed suicide before he went to trial on federal data-theft charges under the act.
Swartz, who believed in open access to information, was indicted for downloading millions of documents from a subscription-based academic database. Although Swartz was authorized to read papers on the site, federal prosecutors alleged that Swartz hacked restricted data from the Massachusetts Institute of Technology’s network. He was indicted for counts of wire fraud, computer fraud, unlawfully obtaining information from a protected computer, and recklessly damaging a protected computer, all with a maximum penalty of 35 years in prison and 1 million dollars in fines.
This week, the CEO of your organization sends you a memo explaining that he has been asked to make a statement before a Congressional committee. In the aftermath of the Swartz case, lawmakers have proposed amending the CFAA. The memo states, “I need you to provide me arguments for amending the CFAA, as well as specifics on where and how the law should be amended. Should some criminal sanctions be preserved? If so, which kind of actions would be appropriate? Provide examples of how your proposed changes would affect potential problems in the workplace.”
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
2.2: Locate and access sufficient information to investigate the issue or problem.
7.4: Align an organization’s security posture to applicable laws, statutes, and regulatory documents.
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
1.8: Create clear oral messages.
Step 1: eLearning Module Cybercrime Awareness
Before you can begin preparing for the upcoming report, you must understand the basics of how the legal systems in the United States deal with cybercrime and how organizations comply with laws, regulations and policies.
Complete the Cybercrime Awareness eLearning module to get an overview of the US legal and justice systems, followed by a discussion of cybercrime, cyberterrorism, prevention, deterrence, investigative authorities, general compliance, cybersecurity laws, regulations, policies, standards, and guidelines.
While completing the module, answer the following questions:
What is the relationship between between criminal and civil court systems as they apply to cybersecurity policy?
What is compliance?
What can US organizations do to comply with regulations?
What policies and technologies can be used to address regulatory issues?
How can US organizations monitor compliance with cybersecurity policies and relevant regulatory requirements?
List the laws and regulations mentioned in the module.
List information security strategies, plans, policies, and procedures mentioned in the module that can be used to reduce regulatory risk.
You will use these answers to write your summary in the next step
Step 2: Write the Cybercrime Awareness Summary
Using the notes you took on the Cybercrime Awareness module in the last step, write a one- to two-page summary. You may use your own insights; however, each of the following items must be briefly discussed:
What is the relationship between between criminal and civil court systems as they apply to cybersecurity policy?
What is compliance?
What can US organizations do to comply with regulatory issues?
What policies and technologies can be used to address regulations?
How can US organizations monitor compliance with cybersecurity policies and relevant regulatory requirements?
List the laws and regulations mentioned in the module.
List information security strategies, plans, policies, and procedures mentioned in the module that can be used to reduce regulatory risk.
Submit your summary for feedback.
https://content.umuc.edu/file/6869841d-3e06-410a-9b56-7bbdfbf3d6f1/1/TATA/CSEC620_module01/index.html
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
