Describe the computer crimes and legal implications

Assignment Help Computer Network Security
Reference no: EM132002944

In this assignment, you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project, Week 3 Project, and Week 4 Project.

Remember to review the scenario document for the company profile and overall security objectives. Modify and correct the plan you created for Week 4 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week.

Use Track Changes or color code your changes and additions so that the changes are easy to identify.

In this week's assignment, you will complete the final security report for ABC, Inc. by considering fault tolerance mechanisms and incorporating a policy and redress system for employees regarding computer crimes and computer use within the organization.

Using the South University Online Library or the Internet, research about the following:

Mechanisms available for fault tolerance in a system

Computer crimes and legal implications for employees

Dispute resolution mechanisms when computer crimes occur Using your project report from Week 4 Project, complete the following tasks by adding 3 to 5 pages to the existing report:

Modify the plan created in Week 4 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week.

Color code your changes to the report so that they are easy to identify.

Create a section of the report that describes the computer crimes and legal implications for the employees. This should include a point of contact for disputes, the process of appeal, and levels of severity and consequence.

This should just be an overview in general terms rather than a complete policy declaration.

Recommend a fault-tolerance mechanism or a combination of fault-tolerance mechanisms that needs to be implemented in the organization to ensure uninterrupted business.

What elements of the business need to be continuous for the business to survive? Justify your answer.

Make sure all prior areas of security for ABC Inc. have been sufficiently addressed along with implementation and verification details. Be sure you have referenced external sources for up-to-date information and comprehensive recommendations. This can include library and Internet research.

Describe the implementation process and timeline for your recommendations.

Try to give as reasonable a timeline as possible and explain your plan. Expand the section of your report for verifying the implementation of the security recommendations for this week.

Identify what is being tested for each verification activity. This should include testing activities to make sure the security system is working properly.

Attachment:- Report.rar

Verified Expert

This section analyses computer crime generally and also some of the computer crime legal implications for employees. Additionally, the section further describes some of the recommended fault tolerance mechanisms for ABC and the effectiveness of the mechanisms. It also presents the timelines for installation of the recommended system and their testing activities.

Reference no: EM132002944

Questions Cloud

Statement in the program could access : Technically, it is possible for C++ programmers to declare class data as public, meaning any statement in the program could access and change the data directly.
How much should a couple deposit : How much should a couple deposit at the end of each month into an investing plan that pays 7.5%, compounded monthly, so that they will have 800,000 in 30 years?
Example of when a void function would be appropriate : List at least one specific example of when a void function would be appropriate and one specific example of when a non-void function would be appropriate.
What should the yearly savings be to achieve objectives : Mr. Smith retires in exactly 20 years. At that time he desires to have accumulated enough money so that he can consume $100,000 per year for perpetuity.
Describe the computer crimes and legal implications : Describe the implementation process and timeline for your recommendations - Identify what is being tested for each verification activity
Social security numbers for processing : Determine whether you would use a struct or an array to store the social security numbers for processing in the program. Provide a rationale for your response.
Difference between a reference vs a static variable : What is the difference between a Reference vs a Static Variable? When would you use either and why?
How much money will the daughter have : Mr. Blochirt is creating a college investment fund for his daughter. He will put in $1,000 per year for the next 5 years starting one year from now and expects.
How much would it cost her to buy the annuity today : Because your mother is about to retire, she wants to buy an annuity that will provide her with $75,000 of income a year for 20 years.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd