1. Why should people care about password security? 2. Can computer hacking be ju

1. Why should people care about password security?
2. Can computer hacking be justified under extraordinary circumstances. Imagine that you will have to break into a neighbor’s car in order to drive a friend, who will otherwise die, to the hospital. You are morally obligated to save a person’s life when it is in your power to do so. You are also obligated to obey the law, which forbids breaking into someone’s motor vehicle. How would your decision in this case be similar or different from determining whether to break into the computer database containing the medical information needed to save someone’s life?  Research HIPPA. How would this effect your decision, or would it?  Can this be justified in a court of law. See if you are able to find similar cases in regard to computer hacking.
3. What is cyberstalking? Research cyberstalking/harassment by communication laws in your state. What would you do, if anything to improve the laws. There are 3 states that currently do not have laws. If you live in one of those states please choose a state to research. Find a case from your state.

Instructions In order to complete assignment #7 you will need to answer the belo

Instructions
In order to complete assignment #7 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #7). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 3-full pages in length with a minimum of 3-outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
A break from the OPM case this week.
1) What is cyberstalking? Research the Megan Meier case. Do you agree with the ruling?
At the time of the Megan Meier suicide, the state of Missouri had the below laws:
SB 0758 – Revises Law Relating to Computer Crimes
565.090 – Includes reference to communications by any means in crime of harassment.
565.225 – Revises definition of “credible threat” relating to crime of stalking to include certain written, electronic or telephonic communications, or certain postings of a site or message.
SB 0070 and SB 255 – Prohibits certain fraudulent use of the Internet effective August 28, 2001
SCS/SBs 70 & 255 – This act prohibits a person from operating an Internet website which causes another person’s computer to dial a telephone number for which a charge is assessed without the other person’s consent. A violation is a Class A misdemeanor unless the long distance charges exceed five hundred dollars, in which case the violation is a Class C felony. The act provides for venue where the victim resides or where the crime occurred. This portion of the act is similar to SB 70.
The act also adds electronic mail messages as a method by which a person may commit the crime of harassment, and prohibits the use of electronic mail to send obscene or indecent commercial messages. This provision is similar to SB 255
Do you think that they should have used these laws to prosecute Drew?

1. What is the need for encryption?  Is it  a good idea for an organization to b

1. What is the need for encryption?  Is it  a good idea for an organization to buy encryption software that uses “secret” algorithms?  
2. How might our understanding of cybersecurity and cybercrime be enhanced?
3. Research corporate espionage. Has corporate espionage been affected by cybertechnology?  Be specific.
4. Cybercriminal communicate with one another all over the world. What problems do issues of jurisdiction pose for understanding and prosecuting crimes committed in cyberspace?

Instructions In order to complete assignment #8 you will need to answer the belo

Instructions
In order to complete assignment #8 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #8). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 3-full pages in length with a minimum of 3-outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
1) Finally, we have reached the conclusion of the OPM court case. The suspects were all found guilty and they all agreed to name the Central Government of China as the organization behind the attack. We need to consider what is the best steps going forward. If we publicly name the Chinese government as the culprits, what type of fall out can we expect. Is CyberWar a possibility? Will there be a technological arms race, along the lines of the Cold War, in new tech, such as quantum computing, etc. Or will we see a series of low level attacks via, IoT, social engineering, etc. Discuss how you would see each of the scenarios playing out.
2) Is it always best to name and shame, or does international relations restrict that approach?

Instructions: Write a 8-12 page paper discussing the below topics as they relate

Instructions:
Write a 8-12 page paper discussing the below topics as they relate to computer crime.
Submission Instructions:
You must provide cases and examples to support the topics.
1) Identify and discuss the steps necessary to make electronic evidence admissible in court.
2) Identify various crimes and incidents that are involved in electronic forensic investigations.
3) Discuss the importance of security and computer use policies.
4) Identify and discuss the techniques to obtain evidence from Internet and Web resources.
5) Identify and discuss the types of evidence that can be recovered from computer and electronic devices.
6) Discuss the importance of documentation and chain-of-custody in the forensic process.
Submit your Term Paper in a Word file for grading.
Specific Instructions for the Term Paper:
Include a title page for your own paper. This includes the “Running Head” in the page header, the title of your paper, and your name. If you don’t know how to edit a header in Word, Google for instructions on how to edit a header in the version of Word you are using and follow the instructions. Also add the university and class info as well as the date authoring the paper.
Write a 150-250 word abstract for your the paper (on p. 2 of the Term Paper). The abstract should be a brief summary of your paper.
Next you need a Table of contents page.
Next you will start the paper. The 8-12 page starts counting from this page. All prior pages are pages for “metadata” information about the paper – and not part of the body of the paper.
For each major section of the paper, you will need to add sub-headings. You may need as many subheading as needed, but each section must have a minimum of three sub-headings. Be sure to be descriptive in your sub-heading names, so that the content following the subheading is informative.
More info on the body of the paper: Write the introductory paragraphs of your term paper (following the table of contents page) underneath the title of your paper. The introductory paragraphs should be at least one page long. These paragraphs should provide the reader with an overview of what you are covering. Your full 8-12 page term paper is due at the end of Week 6. In addition to the 8-12 pages of the paper itself, you must include a title page (abstract and table of contents pages) and a references page. Your title page must include the title of your paper, the date, the name of this course, your name, and your instructor’s name, as well as the university info and the date paper was written.
Your paper must be on the topic of this assignment in computer forensics. Remember to explain the types of software you would use to complete the case. You may use the cases noted in the book for guidance or may use one of your own.
The last section of your paper is the list of references in APA Style format. Name the header “References” then list the references in alphabetical order of the authors’ last name. Include a minimum of 6-10 outside sources cited and referenced in the paper. Your references page must be written in APA citation style.
NOTE: I WILL NOT ACCEPT A PAPER WITH AN ORIGINALITY REPORT OVER 10% OR OVER 1% FROM A SINGLE SOURCE. THIS WILL RESULT IN A GRADE OF 0.
NOTE: This assignment has the classroom TII (TurnItIn) feature turned on. This means that once your assignment has been submitted to this area, it will automatically be submitted to Turnitin.com database to generate an Originality Report with an Originality Index. It takes anywhere from a minute to 24 hours (or longer) for this report to be generated and returned to the classroom assignment area. Check often to see if the report has been generated.
The acceptable criteria for the Originality Index in this course is a maximum of 10%. Which means 10% of the submitted paper has been matched with sources in the database and hence is not original to the student’s work. A 0% match index is ideal and should be aimed for. In addition to the 10% maximum overall match allowance, each of your cited sources should not exceed 1%. The bibliography section of your paper is excluded from the match index by your professor after the report has been generated by filtering this portion in the report. However, each cited source must not exceed 1%.
A report exceeding 10% Match Index will get a grade of 0. Any individual source of more than 1% match will reduce the paper grade by the difference of the match and 1%. So for example, a paper with overall match index of say 5% (which is acceptable for the overall match criteria of 10% max) with an individual source matched at say 4% (which is not acceptable for an individual source criteria of 1% max) will result in a 3 point reduction from the paper score of 12 points. You will have the opportunity to rework your paper and resubmit one for a new report generation. Please refer to Week 1 Announcement regarding Turnitin Originality Report for more details.