Description
- The "APA Paper Template: 100-299" posted in the Tutorials & Guides section of the Center for Writing Excellence website, paying specific attention to APA guidelines
- The readings, videos, and Learning Team discussions from this week
- Table 3-1, "Key U.S. Laws of Interest to Information Security Professionals" of Principles of Information Security
The U.S. has in place many laws related to information security, computer security, and internet use. Many of these laws relate to information governance, accountability, and commercial liability. In addition, the issue of personal privacy is addressed in many of the laws that relate to specific industries, sectors, and types of information.
Write a 1-to 2-page paper using Microsoft® Word that answers the following questions:
- For two laws from Table 3.1 in Principles of Information Security, state the overall intent of each law. For example what do the U.S. Police and Justice Act and the Computer Fraud and Abuse Act of the U.K. do?
- Using a browser and search engine, determine the general number of cases/complaints that have been filed based on each of the laws listed below:
- Computer Fraud and Abuse Act
- National Information Infrastructure Protection Act
- Sarbanes-Oxley Act
- Having reviewed these laws and cases/complaints associated with them, completely answer each of the following:
- Which of these laws seemed more frequently enforced? Which of these laws have resulted in a large financial impact to a business? Which of these have imposed a strict punitive damage (e.g., someone being convicted of fraud)?
- According to your answer above, what infrastructural or cyber domain sector or assets are being protected by such enforcement?
- Accurately explain if the ethical confidentiality of all private information is assured by the three laws
- Based on your Learning Team discussion, list at least two conflicts faced by U.S. cloud service providers when providing services globally.
Use APA citation formatting in all work submission. Follow rules of grammar and usage, including spelling and punctuation.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Really great stuff, couldn't ask for more.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
I need help please!
ScenarioMarymount University has been the target of focused attacks from a variety of attackers. Your manager has assigned ...
I need help please!
ScenarioMarymount University has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.Required ResourcesAccess to the InternetText sheet Zenmap Intense Scan Results , It is uploaded.Tasks1. Analyze the results of the Zenmap scan. Your report must answer the following questions:What are the first five open ports as identified by the Zenmap scan?Include the port numberInclude the service namenclude a brief description of how each is used2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database.Include the name and a brief description of each vulnerability.3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.Submission RequirementsFormat: Microsoft Word (or compatible)Font: Times New Roam, size 12, double-spaceCitation Style: APALength: 2 pages
Start Access. Open the downloaded Access file named exploring_a02_grader_h2, writing homework help
Game Collection
Project Description:
You decide to catalog your video games
in an Access database. In this pro ...
Start Access. Open the downloaded Access file named exploring_a02_grader_h2, writing homework help
Game Collection
Project Description:
You decide to catalog your video games
in an Access database. In this project, you add two tables to a database you
have started—one to identify the game system that plays your game and one to
identify the category or genre of the game. Then you join the tables in a
relationship and query the database to determine which games to take to a
family party.
Instructions:
For the purpose of grading the project you are required
to perform the following tasks:
Step
Instructions
Points Possible
1
Start Access. Open the downloaded
Access file named exploring_a02_grader_h2.
0
2
Create a new table in Design view.
Add the field name SystemID and select AutoNumber as the Data Type. Add the
caption System
ID. Set the SystemID field as the primary key for the table.
8
3
Add a second field named SystemName
with the Short Text Data Type. Change the SystemName field size property to 15.
Add the caption System Name. Save the table as System.
6
4
Switch to Datasheet view and enter
the following system names, letting Access assign the System ID:
XBOX 360
PS3
Wii
NES
PC Game
Nintendo 3DS
Save and close the table.
6
5
Create a new table in Design view.
Add the field name CategoryID and select AutoNumber as the
Data Type. Add the caption Category ID. Set the CategoryID field as
the Primary Key for the table.
8
6
Add a second field named CategoryDescription
and accept Short Text as the Data Type. Change the field size property to 25.
Add the caption Category Description. Save the table as Category.
8
7
Switch to Datasheet view and enter
the following system names letting Access assign the Category ID:
Action
Adventure
Arcade
Racing
Rhythm
Role-playing
Simulation
Sports
Save and close the table.
8
8
Begin establishing relationships in
the database by adding the Category, Games, and System tables to the
Relationships window. Close the Show Table dialog box. Create a one-to-many
relationship between the SystemID field in the System table and the SystemID
field in the Games table, enforcing Referential Integrity. Select the option
to cascade update the related fields.
8
9
Create a one-to-many relationship
between the CategoryID field in the Category table and the CategoryID field
in the Games table and enforcing Referential Integrity. Select the option to
cascade update the related fields. Save and close the Relationships window.
6
10
Create a simple query using the Query
Wizard. From the Games table, add the GameName and Rating fields (in that
order). Save the query using the title Ratings and close the query.
8
11
Create a new query in Design view.
Add the Category, Games, and System tables to the query design window. Add
the following fields to the query (in this order).
GameName
CategoryDescription
Rating
SystemName
DateAcquired
8
12
Sort the query in Ascending order by
GameName and run the query. Save the query as Game List. Close the query.
8
13
Copy the Game List query in the
Navigation pane and paste it with the name PS3 Games. Modify the query
in Design view by using PS3 as the criteria for SystemName. Remove
the sort by GameName and sort in Ascending order by CategoryDescription.
Save and run the query. Close the query.
8
14
Create a new query in Design view.
Add the Category, Games, and System tables to the query design window. Add
the following fields to the query (in this order).
GameName
Rating
CategoryDescription
SystemName
6
15
Set the Rating criteria so that only
games with an Everyone rating display. Save the query as Party
and run the query. Close the query.
4
16
Close all database objects. Close
the database and then exit Access. Submit the database as directed.
0
Total Points
100
3 pages
INF336 Ashford Week 4 Quiz Target Pricing and Product Costing Quiz
Question 2. 2. Online reverse auctions are useful means of price determination for special Question 3. 3. An escalator cla ...
INF336 Ashford Week 4 Quiz Target Pricing and Product Costing Quiz
Question 2. 2. Online reverse auctions are useful means of price determination for special Question 3. 3. An escalator clause provides for an ...
American Government Right to Privacy Case Study Analysis
InstructionsRight to Privacy Case StudyCertain freedoms such as civil liberties and civil rights are concepts highly rever ...
American Government Right to Privacy Case Study Analysis
InstructionsRight to Privacy Case StudyCertain freedoms such as civil liberties and civil rights are concepts highly revered by Americans; however, there are times when these two concepts conflict in the name of safety and national security. The Digital Age is having a profound effect on the privacy of individuals in both their daily and private lives. With technology like cameras and smartphones, the activities of people are being recorded more, whether it is running a red light, entering a building, playing in a park, or using an ATM machine.In this assignment, you will analyze a case involving public safety versus an individual's privacy. Read the following article from the New York Times concerning Carpenter v. United States, a case recently decided by the Supreme Court.Liptak, A. (2018, June 23). Warrant required for cellphone tracking data. New York Times, p. A1(L). Retrieved fromhttp://link.galegroup.com.libraryresources.columbiasouthern.edu/apps/doc/A543973598/ STND?u=oran95108&sid=STND&xid=753160e8For more background on the case, here is a link to the actual opinion written for this case: https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdfPlease answer the following questions concerning this case. Address the questions in a cohesive essay. It should be at least two pages in length and should be double-spaced, and typed in 12-point Times New Roman font. Please be sure to provide an introduction to your essay,Which part of the Constitution addresses individual privacy rights? Do you believe that, with today's technology, the Constitution still adequately protects those rights? Why, or why not?Describe the issue that was debated in this case. How was the need for public safety and security balanced with individual civil liberties and civil rights impacted by the final ruling in this case?Do you agree with the majority opinion or the dissenting opinion in this case? Explain your response. Where do you personally draw the line in this privacy issue?Explain how historical thought and tradition affect civil liberties and rights as they pertain to the issue presented in this case.Describe how politics can intersect with civil rights.What consequences do you support for those who violate constitutional rights?What, if any, compensation do you recommend for individuals whose rights have been violated by others?You must use at least two sources, in addition to the article given, to support your response. Make sure that all sources are cited and referenced using APA style.
7 pages
FIN 320 Week 5 Learning Team Assignment Capital Investment Decisions Case Study and Presentation
FIN 320 Week 5 Learning Team Assignment Capital Investment Decisions Case Study and Presentation
FIN 320 Week 5 Learning Team Assignment Capital Investment Decisions Case Study and Presentation
FIN 320 Week 5 Learning Team Assignment Capital Investment Decisions Case Study and Presentation
7 pages
T264 Internship Experience
As an analyst student, and as I conclude my internship, I have learned a lot of things about the running of a business suc ...
T264 Internship Experience
As an analyst student, and as I conclude my internship, I have learned a lot of things about the running of a business successfully. An internship is ...
Similar Content
WRTG 1320 UCK Gun Control Abortion & Critical Race Theory Paper
← 1320-p1, 30048-sum1-22(1).pdf
(http://owl.english.purdue.edu/owl/).
1.) Use 12-point, Times New Roman font
2 of 2
STEP...
ASU Newport Comp Systems Microsoft Windows 8 & 10 Analysis & Comparison Discussion
Answer the following questions in paragraph format. Your answers should be 1-2 pages in length. Your final submission shou...
NJIT DNA Analysis Biblography
: https://www.nytimes.com/2019/01/21/science/dna-crime-gene-technology.html
One of the primary qualities that student wor...
Week 2 Assignment
Case Study: MBA Schools in Asia-PacificPurpose of Assignment The purpose of this assignment is to develop students' analyt...
Native American Culture - Sherman Alexie and Vine Deloria Research Paper
The Authors I need information on are: Please include all information listed below:Sherman Alexis and Vine DeloriaExplorin...
“How to Say Nothing in 500 Words” and “Life Under the Chief Doublespeak Officer, journal assignment help
Both of the personal essays we have read this week, “How to Say Nothing in 500 Words” and “Life Under the Chief Doub...
SRM320 Ashford Week 1 Interscholastic & Intercollegiate Sport Program Quiz
Which of the following is listed by DuBrin as a function of management? Which of the following phrases would not properly ...
2015 Form 8917
Information about Form 8917 and its instructions is at www.irs.gov/form8917. You cannot take both an education credit from...
Now
As Adam stone vividly elucidates in his article, “For the Army, a 3-D printed drone is nice” that drone can be printed...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
I need help please!
ScenarioMarymount University has been the target of focused attacks from a variety of attackers. Your manager has assigned ...
I need help please!
ScenarioMarymount University has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.Required ResourcesAccess to the InternetText sheet Zenmap Intense Scan Results , It is uploaded.Tasks1. Analyze the results of the Zenmap scan. Your report must answer the following questions:What are the first five open ports as identified by the Zenmap scan?Include the port numberInclude the service namenclude a brief description of how each is used2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database.Include the name and a brief description of each vulnerability.3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.Submission RequirementsFormat: Microsoft Word (or compatible)Font: Times New Roam, size 12, double-spaceCitation Style: APALength: 2 pages
Start Access. Open the downloaded Access file named exploring_a02_grader_h2, writing homework help
Game Collection
Project Description:
You decide to catalog your video games
in an Access database. In this pro ...
Start Access. Open the downloaded Access file named exploring_a02_grader_h2, writing homework help
Game Collection
Project Description:
You decide to catalog your video games
in an Access database. In this project, you add two tables to a database you
have started—one to identify the game system that plays your game and one to
identify the category or genre of the game. Then you join the tables in a
relationship and query the database to determine which games to take to a
family party.
Instructions:
For the purpose of grading the project you are required
to perform the following tasks:
Step
Instructions
Points Possible
1
Start Access. Open the downloaded
Access file named exploring_a02_grader_h2.
0
2
Create a new table in Design view.
Add the field name SystemID and select AutoNumber as the Data Type. Add the
caption System
ID. Set the SystemID field as the primary key for the table.
8
3
Add a second field named SystemName
with the Short Text Data Type. Change the SystemName field size property to 15.
Add the caption System Name. Save the table as System.
6
4
Switch to Datasheet view and enter
the following system names, letting Access assign the System ID:
XBOX 360
PS3
Wii
NES
PC Game
Nintendo 3DS
Save and close the table.
6
5
Create a new table in Design view.
Add the field name CategoryID and select AutoNumber as the
Data Type. Add the caption Category ID. Set the CategoryID field as
the Primary Key for the table.
8
6
Add a second field named CategoryDescription
and accept Short Text as the Data Type. Change the field size property to 25.
Add the caption Category Description. Save the table as Category.
8
7
Switch to Datasheet view and enter
the following system names letting Access assign the Category ID:
Action
Adventure
Arcade
Racing
Rhythm
Role-playing
Simulation
Sports
Save and close the table.
8
8
Begin establishing relationships in
the database by adding the Category, Games, and System tables to the
Relationships window. Close the Show Table dialog box. Create a one-to-many
relationship between the SystemID field in the System table and the SystemID
field in the Games table, enforcing Referential Integrity. Select the option
to cascade update the related fields.
8
9
Create a one-to-many relationship
between the CategoryID field in the Category table and the CategoryID field
in the Games table and enforcing Referential Integrity. Select the option to
cascade update the related fields. Save and close the Relationships window.
6
10
Create a simple query using the Query
Wizard. From the Games table, add the GameName and Rating fields (in that
order). Save the query using the title Ratings and close the query.
8
11
Create a new query in Design view.
Add the Category, Games, and System tables to the query design window. Add
the following fields to the query (in this order).
GameName
CategoryDescription
Rating
SystemName
DateAcquired
8
12
Sort the query in Ascending order by
GameName and run the query. Save the query as Game List. Close the query.
8
13
Copy the Game List query in the
Navigation pane and paste it with the name PS3 Games. Modify the query
in Design view by using PS3 as the criteria for SystemName. Remove
the sort by GameName and sort in Ascending order by CategoryDescription.
Save and run the query. Close the query.
8
14
Create a new query in Design view.
Add the Category, Games, and System tables to the query design window. Add
the following fields to the query (in this order).
GameName
Rating
CategoryDescription
SystemName
6
15
Set the Rating criteria so that only
games with an Everyone rating display. Save the query as Party
and run the query. Close the query.
4
16
Close all database objects. Close
the database and then exit Access. Submit the database as directed.
0
Total Points
100
3 pages
INF336 Ashford Week 4 Quiz Target Pricing and Product Costing Quiz
Question 2. 2. Online reverse auctions are useful means of price determination for special Question 3. 3. An escalator cla ...
INF336 Ashford Week 4 Quiz Target Pricing and Product Costing Quiz
Question 2. 2. Online reverse auctions are useful means of price determination for special Question 3. 3. An escalator clause provides for an ...
American Government Right to Privacy Case Study Analysis
InstructionsRight to Privacy Case StudyCertain freedoms such as civil liberties and civil rights are concepts highly rever ...
American Government Right to Privacy Case Study Analysis
InstructionsRight to Privacy Case StudyCertain freedoms such as civil liberties and civil rights are concepts highly revered by Americans; however, there are times when these two concepts conflict in the name of safety and national security. The Digital Age is having a profound effect on the privacy of individuals in both their daily and private lives. With technology like cameras and smartphones, the activities of people are being recorded more, whether it is running a red light, entering a building, playing in a park, or using an ATM machine.In this assignment, you will analyze a case involving public safety versus an individual's privacy. Read the following article from the New York Times concerning Carpenter v. United States, a case recently decided by the Supreme Court.Liptak, A. (2018, June 23). Warrant required for cellphone tracking data. New York Times, p. A1(L). Retrieved fromhttp://link.galegroup.com.libraryresources.columbiasouthern.edu/apps/doc/A543973598/ STND?u=oran95108&sid=STND&xid=753160e8For more background on the case, here is a link to the actual opinion written for this case: https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdfPlease answer the following questions concerning this case. Address the questions in a cohesive essay. It should be at least two pages in length and should be double-spaced, and typed in 12-point Times New Roman font. Please be sure to provide an introduction to your essay,Which part of the Constitution addresses individual privacy rights? Do you believe that, with today's technology, the Constitution still adequately protects those rights? Why, or why not?Describe the issue that was debated in this case. How was the need for public safety and security balanced with individual civil liberties and civil rights impacted by the final ruling in this case?Do you agree with the majority opinion or the dissenting opinion in this case? Explain your response. Where do you personally draw the line in this privacy issue?Explain how historical thought and tradition affect civil liberties and rights as they pertain to the issue presented in this case.Describe how politics can intersect with civil rights.What consequences do you support for those who violate constitutional rights?What, if any, compensation do you recommend for individuals whose rights have been violated by others?You must use at least two sources, in addition to the article given, to support your response. Make sure that all sources are cited and referenced using APA style.
7 pages
FIN 320 Week 5 Learning Team Assignment Capital Investment Decisions Case Study and Presentation
FIN 320 Week 5 Learning Team Assignment Capital Investment Decisions Case Study and Presentation
FIN 320 Week 5 Learning Team Assignment Capital Investment Decisions Case Study and Presentation
FIN 320 Week 5 Learning Team Assignment Capital Investment Decisions Case Study and Presentation
7 pages
T264 Internship Experience
As an analyst student, and as I conclude my internship, I have learned a lot of things about the running of a business suc ...
T264 Internship Experience
As an analyst student, and as I conclude my internship, I have learned a lot of things about the running of a business successfully. An internship is ...
Earn money selling
your Study Documents