Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Business Law & Ethics Expert

(A Safe Assign note : All work submitted will be checked for plagiarism using an automated tool developed by Blackboard. Work will be checked against a variety of sources including the internet as well as institutional document archives and the Global Reference Database containing papers that were volunteered by students from Blackboard client institutions to help prevent cross-institutional plagiarism.

Assignment 1

Cyber crime has become a central part of modern day organized crime. Security experts around the world cite cybercrime as a real, emerging threat in the international community. Organized crime no longer needs to use threat tactics and violence to obtain illegal money and achieve their goals; they have an entire cyber world at their fingertips. Cyber criminals have at their disposal a wide variety of tactics and the problem of how to combat cyber threats and protect computer networks has been a priority. There are, fortunately, different steps that can be taken as an organization and an individual to help prevent cyber crimes from occurring and defend against it

Assignment: What do you see as potential main threats posed by the widespread use of information technology and databases of personal information, in modern business? How can law be extended to protect against these threats without stifling technical innovation and business activity more than absolutely necessary? Please discuss.

Please find below two news reports that address some of the information security and cyber-crime topics covered in our course. China's cyber abilities worry U.S.: spy chief " WASHINGTON (Reuters) - China's growing capabilities in cyber-warfare and intelligence gathering are a "formidable concern" to the United States, the top intelligence official told a Senate panel on Thursday."The Chinese have made a substantial investment in this area, they have a very large organization devoted to it and they're pretty aggressive," Director of National Intelligence James Clapper told the Senate Armed Services Committee.

"This is just another way in which they glean information about us and collect on us for technology purposes, so it's a very formidable concern," he said.

Clapper, addressing questions at an annual hearing on worldwide security threats, did not elaborate on Chinese cyber activities. But in his written testimony, the intelligence chief said 2010 saw a "dramatic increase in malicious cyber-activity targeting U.S. computers and networks." The passage did not specifically mention China.

Clapper also cited an April 8, 2010, incident in which state-owned China Telecom advertised erroneous network routes that instructed "massive volumes" of U.S. and other foreign Internet traffic to go through Chinese servers for 17 minutes.

"This incident affected traffic to and from U.S. government and military sites, including sites for the Senate, the Army, the Navy, the Marine corps, the air force, and the office of the Secretary of Defense, as well as a number of Fortune 500 firms," he said.

When that incident was revealed in late 2010, China Telecom denied that it hijacked U.S. Internet traffic. China's standard response to cyber-attack allegations has been to deny any connection to them and say it is also a victim of such attacks."[1]

"Cybercriminals are increasingly moving from stealing just personal data to capturing trade secrets and other corporate intellectual capital that they can easily sell through the underground market, according to a new report from McAfee and the SAIC.

In today's release of a new study, "Underground Economies: Intellectual Capital and Sensitive Corporate Data Now the Latest Cybercrime Currency" (PDF), McAfee and the Science Applications International Corporate find that the theft of trade secrets, marketing plans, R&D data, and even source code is on the rise, especially as such information is often unprotected.

Based on a global survey of IT professionals, the report uncovered a number of findings.

A quarter of the companies surveyed said a data breach or just the threat of one has put a halt on plans for a merger or new product launch. Among those that actually suffered a data breach, only half of them took the necessary steps to prevent it from happening again.

Among companies that have been hit by cyberattacks, only about 3 in 10 have reported all such breaches, while 6 in 10 picked and chose which ones they reported. Along those lines, many organizations specifically look to store their data in countries where the laws are more lax over reporting data breaches to customers

Assignment:

Identify and analyze information security and cybercrime law issues raised in these two cases. What are the possible solutions? Address the issues covered in the course that are relevant and applicable in these scenarios

Business Law & Ethics, Finance

  • Category:- Business Law & Ethics
  • Reference No.:- M9524957

Have any Question?


Related Questions in Business Law & Ethics

Australian commercial and corporations law assignment -this

Australian Commercial and Corporations Law Assignment - This assignment deals with critical problem solving skills. This assessment tests course objectives addressing: Knowledge of relevant law, Application of the law to ...

Assessment taskassignment questiondiscussi the main ways

Assessment Task Assignment question: Discuss: i. the main ways that a company may source finance; and ii. the benefits and costs associated with the main sources of corporate finance. Guidance - Students are to read text ...

Compare and contrast tort law and criminal law explain the

Compare and contrast tort law and criminal law. Explain the purpose of the law of torts in contract to the purposes of criminal law. Why are they different? Support your answer using specific examples from the textbook.

Question 1it has been said that good corporate governance

Question 1 It has been said that good corporate governance is an important ingredient in corporate success and that regulators should encourage good corporate governance. Required Discuss how good corporate governance is ...

Assessment descriptionyou are required to watch the

Assessment Description You are required to watch the following YouTube clips from the GRI Secretariat: 1. The GRI Sustainability Reporting Standards: The Future of Reporting 2. Introducing the GRI Standards You must also ...

Exerciseform yourselves into groups and consider the

Exercise Form yourselves into groups and consider the question: What is research? Write a list of 5 characteristics of research. What are the characteristics of research at postgraduate level? Scholarship: "The analysis ...

Managing the legal environment assignment - research

MANAGING THE LEGAL ENVIRONMENT ASSIGNMENT - RESEARCH PROJECT Company: Nike (a) Summarise in about 250-500 words the characteristics/features of the organisation (you can choose a statutory/government body or select a bus ...

Instructionplease choose one question from the following to

Instruction Please choose One question from the following to answer: 1. Dealsgate is a Victorian town in Southern-East England, famous for its beautiful beach. It used to attract many world-renowned writers and scholars ...

The good cop click on the tab and read the journal essay

The Good Cop." Click on the tab and read the journal essay. Pay particular attention to II The Third Way: Rightful Policing. In the essay, the author makes the case for, what she terms, "rightful policing." What is right ...

Corporations law - assignment questions -objectives -

CORPORATIONS LAW - ASSIGNMENT QUESTIONS - Objectives - Answer the following questions with reference to the relevant statute law and general common law principles operating in Australia concerning the consequences of the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As