Reference no: EM133916606
Cyber Security Governance and Management
Assessment: Research Report
Introduction
In this individual assessment, you will select a country and explain the legislated cyber security regulation, laws and ethics. You should provide your opinion on your findings. You are required to reference original laws (e.g. commlaw) or court cases and to provide all references (PDFs, links, etc). Get expert-level assignment help in any subject.
Research and discuss cyber issues concern. Identify and compare your chosen country and applicable laws in each region (Australian-Pacific, Europe, America, and Asia). Recommend what type of policy/procedures an organisation should have in place on the issue (do not write the policy/procedure) Recommend any other initiatives (for example, Counter Ransomware Initiative) that might be applicable.
Your final report must include the following:
Assignment Cover Page: (Use the cover sheet provided. Include the Title,
Assignment number, Student Names and IDs, Subject)
Executive summary
Body (Numerous headings and text at the write choice)
References/ Bibliography
Topics:
No two students can do the same topic. You are not limited to topics below.
Australian Anti-Piracy Laws (2015).
Explain the law and how it will be used
Explain how it can be misused
Do you think it will work? Why/Why Not? Alternative? What are other
countries doing?
Who will it hurt and who will it protect? (In reality, not just who it is intended for)
Bitcoins
Research bitcoins. How it works and how it is used. (e.g. Bitcoin mining)
Explain its advantages and disadvantages in detail (e.g. can it be tracked?)
Fraud
Crippleware verses Freeware versus educational verses Professional
Explain the difference
What type of infringements are they trying to mitigate?
Does it work?
Freedom of Speech verses Protection of Children
Explain various Government (US, Europe, Asia, Australia-Pacific) approaches
Explain which laws were created as a consequence of this issue.
Did they work?
Freedom of Speech versus the China Great Firewall
Explain what the Government is trying to mitigate
Explain the technical implementation - how to overcome it.
Does this breach Freedom of Speech in Western Countries
Sexting
Explain what it is?
Technical possibilities to restrict
Is it a breach of Privacy?
Revenge Porn
Explain what it is?
Technical possibilities to restrict.
What have Governments (particular California) done to try and stop it?
Online Consumer Profiling versus Privacy Laws
Explain what it is?
Technical implementation
Why are people concern?
Online Self Regulatory Privacy
Explain what it is?
Technical implementation (e.g. Privacy seals, Membership, etc)
Does it work? What is the alternative?
Do Not Track List versus the Privacy Laws
Explain what it is?
Technical implementation (e.g. Google Chrome Incognito mode vs Firefox vs Windows 10 Approach)
Would it work? What is the alternative?
Australian tax online services proposal
Explain what it is?
What are other countries doing?
Technical implementation (e.g. Google Chrome Incognito mode vs Firefox vs Windows 10 Approach)
Would it work? What is the alternative?
Cloud Services implication?
Reverse engineering
What is it?
Do the current Australian laws provide adequate protection?
Landmark cases?
What are other countries doing?
Small Business Fraud
Explain the main types (False invoicing, EFT to personal accounts, Cheque/Payroll Fraud, Skimming)
Do the current Australian laws provide adequate protection?
Why does it happen?
What are other countries doing?
Long term impact?
Who is the victim?
Legal Issue with Open-Source Code
Explain legal issues with Open-Source Code
Conformity, detection, prevention
Legal action
Types
What are governments doing?
Which laws applies
Cyberbullying and Cyberstalking
What is it?
Cases
Prevention?
Prosecution?
Cyberterrorism
- What is it?
Instructions for Writing the Research Report (1000 Words)
Your final report must include the following sections:
Assignment Cover Page: Use the provided cover sheet. Include the Title, Assignment number, Student Names and IDs, and Subject.
Executive Summary and Conclusion: Summarize the entire document with key findings. Ensure it is accurate and appropriately deduces conclusions from the evidence.
Body (Numerous headings and text at the write choice): This section should cover the core of your research.
Research and Discuss Cyber Issues Concern: Introduce your report and explain the relevance of the chosen cyber issue. You need to comprehensively research and justify the concern.
Identify and Compare Your Chosen Country and Applicable Laws in Each Region (Australian-Pacific, Europe, America, and Asia): Describe with appropriate laws and critically compare each region's legal requirements related to your topic. This requires a comprehensive identification and comparison of all applicable laws across these global regions.
Recommend What Type of Policy/Procedures an Organisation Should Have in Place on This Issue: Identify what measures an organisation should implement, including the development of relevant policies. Comprehensively identify policy/procedures needed to combat the cyber issue.
Recommend Any Other Initiatives (For example, Counter Ransomware Initiative) That Might Be Applicable: Conclude your report with key laws and recommendations, including other relevant initiatives. Comprehensively explain initiatives and, where appropriate, develop your own initiatives.
References/Bibliography: Provide a comprehensive list of all sources used.
Appendix (including references): Include screenshots of activities such as laws, comparisons of regions, etc.. Demonstrate efficient use of the Appendix, ensuring it supports the collected evidence, and use appropriate reference citation.