There are five (5) questions. Each defense is excellence 20 points. Each defense is poor to 300 vote. Points may be deducted for courteous the message name. The subjoined criteria conciliate be used for grading: relevance and exactness, truthfulness, clarity and argumentative run, spelling, language, and peculiar citations/Reference List.
1. Life Style Surveillance
Digitization, technology and applications enjoin us to mentor our visible spectre and vigor statistics. Employers are increasingly zealous in influencing or guiding the non-effort activities of their employees. Describe the possible benefits to be gained from employers’ collecting/using employee lifestyle axioms. For model, do employees training frequently? Do they steam? Document one model of an employer collecting or entranceing advice encircling employee non-obligation activities. Identify and teach juridical and ghostly challenges to the experience of mentoring employee off- obligation lifestyle activities.
2. Ransomware Preparation
There entertain been a calculate of ransomware incidents this year. You are the CISO for a slight U.S. concourse that collects and stores specific advice including financial axioms. What are the key activities you deficiency to do to lay for the possibility of a ransomware onslaught? Be fast to voicelessness why each of these activities is leading.
3. Bring Your Own Device (BYOD) and Acceptable Use
Most form depend on an Acceptable Use Policy (AUP) to name the specific use of concourse instrument. But, BYOD instrument the devices entity used for effort suit to employees. Discuss how an form can/should husband the specific use of specific devices. What are most leading restrictions the form can fix? Why are these names leading? How can they be symmetrical and enforced?
4. Computer Fraud and Abuse Act (CFAA)
This key cybersecurity law makes it a federal misdeed to intentionally entrance a computer outside authorization or to yield verified entrance and get advice from a protected computer. Teach the outcome(s) presented by the CFAA expression, “authorization,” using late model(s).
5. The Privacy Act and Axioms Brokers
The Privacy Act controls the federal legislation guard of true axioms in its systems of records. Teach how or if that Act applies to axioms the legislation entrancees from retail axiomsbrokers.