Csci 415 ethics and law and cybersecurity assignment problem

Assignment Help Computer Network Security
Reference no: EM132383302

CSCI 415 Ethics, Law and Cybersecurity

Chapter 6 - Quiz 6

Instructions: There are three (3) topic areas listed below that are designed to measure your knowledge level specific to learning outcome (LO 6) shown in your course syllabus. You must respond to #1 and select any other one of these topic areas providing appropriate responses in essay form. In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text. Be sure to address all parts of the topic question as most have multiple parts.

A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well. You cannot use information from the text book or any book/article by the author of the text book as a current event.

Make sure that your reference has a date of publication. For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.

This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.

Strong arguments can be given as to why encryption tools are needed to safeguard communications in cyberspace, yet these tools can be used by terrorists and criminals to protect their communications in cyberspace.

(a) In the wake of September 11, can a case be made for not allowing ordinary users to employ strong encryption tools in Internet communications?

(b) Can we still claim to live in a free society if plans for government interception of email communications, as provided for in the Homeland Security Act, are be implemented? Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (comprehension)

In the discussion of Internet anonymity, some forms of anonymous behavior in cyberspace can have profound ethical implications. Imagine that there is a very close political election involving two candidates who are running for a seat in a state legislature.

The weekend before citizens will cast their votes, one candidate decides to defame his opponent by using an anonymous remailer service (which strips away the original address of the sender of the email) to send a message of questionable truth to an electronic distribution list of his opponent's supporters.

The information included in this email is so defamatory that it may threaten the outcome of the election by influencing many undecided voters, as well as the libeled candidate's regular supports, to vote against her.

(a) Does the "injured" candidate in this instance have the right to demand that the identity of the person using the anonymous remailer (who she suspects for good reasons to be her opponent in this election) be revealed?

(b) Why or why not? Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (comprehension)

Is the expression "ethical hacker" an oxymoron?

(a) Do you agree that some individuals should be allowed to be "certified" as hackers to work on behalf of industry or for the interest of other organizations?

(b) Do the kinds of activities permitted by certified hackers in the CEH program raise any moral issues? Explain. Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses.

Reference no: EM132383302

Questions Cloud

Describe issues of telehealth virtual nursing practice : Review the legal, ethical, or regulatory issues of telehealth's virtual nursing practice from non-traditional work settings (i.e., home). Provide examples.
Describe the features of fertilization and cleavage : Explain the significance and describe the features of fertilization and cleavage in early animal development
Define what are some of the benefits of program planning : What are some of the benefits of program planning, and what steps would you take to put them in place in a unit where you are the nurse leader?
Which of these were acquired by endosymbiosis : Which of these three cellular structures were acquired first, and why is this crucial? What is the evidence that suggests which one was acquired second?
Csci 415 ethics and law and cybersecurity assignment problem : CSCI 415 Ethics, Law and Cybersecurity Assignment help and Solutions-Texas A&M University-Can we still claim to live in a free society if plans for government.
What is the economic importance of fermentation by yeast : What is the economic importance of fermentation by yeast?
Does bph predispose the patient to cancer : The 57-year-old patient noted urinary hesitancy and a decrease in the force of his urinary stream for several months. Both had progressively become worse.
Develop and deploy the application in ibm cloud : Evaluate existing and new functionalities to address business problems and Develop and deploy the application in IBM Cloud;
What are the possible side effects of medications prescribed : What are the possible side effects of the medications prescribed? What education would you provide to the patient regarding both H. Pylori and the treatment.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd