Questions are multiple choice and fill-in. Select the best answer by circling the best multiple-choice answer. Fill-in is a short response. Each question is worth 3 points unless indicated otherwise.
1. Recently, there was an outbreak of a computer virus, known as the Melissa virus. The FBI is determining whether the virus meets the requirements in the criminal code for an investigation. Which legal justification should be used by the FBI to pursue this matter?
a. Creation of computer viruses are illegal.
b. Approval from Microsoft was not granted using Microsoft’s Outlook program to spread the virus.
c. The transmission of a program, information, code, or command that intentionally causes damage without authorization, to a protected computer.
2. As a systems administrator, where can you go, On-Line, to obtain solutions to computer viruses.
a. Federal Bureau of Investigation (FBI)
b. National Security Agency
c. Carnegie Mellon’s Computer Emergency Response Team (CERT)
d. John’s Hopkins Applied Physics Laboratory
3. The Electronic Communications Privacy Act includes all the following statements except:
a. Forbids trespass by all persons and businesses, not just government, where they “obtain or alter data, or prevent authorized access
b. Requires intent to defraud
c. Does not require a specified minimum dollar value of damages
d. Up to one year in prison and US$ 250K fines if for personal or commercial gain
4. In 1992, Federal law enforcement agents arrested five members of a hacker group. They were charged with breaking into the personnel department’s computer system and changing some evaluations. What was the computer security threat in this scenario?
a. Fraud
b. Data Modification
c. Theft
5. List 6 of the 8 security Incident Response steps and explain why they are necessary. (This question is worth 6 points)
6. List 3 signs of a security incident and explain why these are a security concern.
7. The article “Tale of a Virus Attack” emphasizes which aspect of Information Security?
a. Legal Issues
b. Risk Management
c. Response and Recovery
d. Access Control
8. Identify three FISMA security controls that can be used to mitigate a threat for a wireless network.
9. Select three wireless protocols that provide strong authentication and/or access control.
10. Review the attached amendment (see attached in BlackBoard Documents) to a United States Code that address fraud and related activities in connection with computers. You are representing the United States Government as the prosecuting attorney. You have sufficient evidence that the individual committed fraud against a financial institution, causing damage that resulted in a loss of data. What punishment will you recommend and why? (answer with 400 – 500 words)
11. Identify and describe current email privacy laws and compliance regulations. (answer with 300 – 500 words)
12. Identify the security features for a commercial product that provides PKI as a Service (do not use the Symantec CPS). Is this product/service FISMA compliant? Provide your rationale. (answer with a minimum 500 words)
13. Identify the effectiveness of the five wireless authentication protocols against the two attack techniques in the matrix. Complete the matrix by selecting whether the effectiveness of a type of wireless authentication protocol is high or low (provide a rationale for your selection) against the two types of threats identified in the matrix. (answer with a minimum a of 500 words)
Select your paper details and see how much our professional writing services will cost.
Our custom human-written papers from top essay writers are always free from plagiarism.
Your data and payment info stay secured every time you get our help from an essay writer.
Your money is safe with us. If your plans change, you can get it sent back to your card.
We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.
Get instant answers to the questions that students ask most often.
See full FAQOur professional writing service focuses on giving you the right specialist so the one assigned will have the knowledge about the right topic. However, if you’ve used our essay service before, you can ask us to assign you the expert writer who used to complete papers for you in the past. We can easily do so if the specialist in question is available at the moment.
If you’re ordering from our essay writing service for the first time, we will assign you a suitable expert ourselves and ensure that your academic essay writer is a pro. Moreover, let us know how complex your assignment is so that we can find the best match for your order.
We’ve hired the best writers in 80+ academic subjects to complete any paper you need. As soon as we hear, “Write my essays,” our support team assigns you the writer who understands your needs and subject.
In case you need to make sure we’ve picked a great specialist to deal with your paper, you can chat with the expert writers directly. We do our best to make sure you’re happy with the writer we’ve selected for you.
We have been selling original essays for more than 15 years. To prove that we are a trustworthy custom essay writing company, we provide quick delivery and a money-back guarantee. If we can’t complete your paper for any reason, we’ll send your money back to the credit card. We want to deliver the finest services, so you can decide if the paper is good enough; from our side, we’ll edit it according to your primary requirements to make the writing perfect. Our online paper writing service is about both giving you the materials you need when you need them and ensuring that your private data is safe. Check out our guarantees to see how we control the quality of your assignment and protect you as a customer.