Unit 10 Assignment
Cyber forensics has become a vital tool in criminal prosecution and in detecting and deterring
criminal activity. Through deduction and meticulous combing of details facts have been
discovered and used in court proce
1. The IT assets I listed as critical to both were File Servers, Dedicated Storage on
the servers for the teachers for student information, Firewall(s), Router(s), and
Switch, Wireless Access, Principal Laptop, and Student Records.
Unit 3 Assignment 1: Fourth Amendment
The fourth amendment safeguards against unreasonable searches and seizures, basically
protecting our belonging and property. It states The right of the people to be secure in their persons,
1. Cyber stalking: Cyber stalking is a crime in which the attacker harasses a victim using electronic
communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or
a discussion group. A cyber stalke
While the field of electronic commerce has often focused on the rise and fall of dot
coms, a major transformation is under way in many traditional organizations that are investing
heavily in Internet technologies in order to improve financial performance.
Identify the four recognized business functions and each security practice of OpenSAMM.
Governance, Contruction, Verification, Deployment
Identify and describe the three maturity levels for security practices in SAMM . Each of the
twelve Security Practice
Mayra Ortiz Ramirez
Chapter 8 Assessment
1. Which regulation controls the export of military or defense applications and
a. A. ITAR
2. What information must a federal agency include in a private impact assessment?
a. A government agency must s
Litigation Hold Notice
The College has a legal obligation to preserve evidence and records, including
electronic documents that are relevant to a pending or potential claim or action, such as
a government audit, administra
1. 150 Workstations, laptops and desktops
Original Cost: Depending on which hardware you purchase youre looking between
$500 and $900 per device
2. Linux Servers
Original Cost: There are 2 Linux servers in this envi
RECORD RETENTION POLICY
College Record Retention Policy
It is the College's policy regarding the retention and disposition of Premier College records to
comply with local, state and federal laws.
This policy ap
IT Asset Description
Seven Domains of
laptops and desktops
Linux Server #1
DNS, FTP, TFTP
Linux Server #2
Microsoft Server #1
& Customer Database
Microsoft Server #2
Thankyo ufo rjo ining us to day.
Weve worked together with Microsoft Learning Partners and Microsoft IT
Academies to bring you a world-class learning experience, including:
Mic ro s o ftCe
1. When a student transfers from one school to another, the school can transfer the
students record to the new school _.
Only with written consent
Only with both parental and student consent
With just student consent
2. A scandal in
Unit 10 Assignment 1: Executive Summary on Computer Forensics Suites
Computer forensics is a relatively new scientific process for examining data stored on, received,
or transmitted by electronic devices. The data from these electronic d
1. In contract law, when a contract is breached, the non-breaching party has an obligation
to not aggravate the harm caused by the breach. This is called _.
A duty to mitigate
A requirement to continue
An obligation to comply
A duty to notify the c
Security for Web Applications and Social Networking
ASSESSMENTS: UNIT 1 QUIZ 1
IS3445 Security for Web Applications
and Social Networking
Course Revision Table
1.Did Card Systems Solutions break any federal or state laws?
Yes. One law that was broken was the Gramm-Leach-Bliley law.
2. Card Systems Solutions claims to have hired an auditor to assess compliance with PCI DSS and other
Best practices for ensuring th
Unit 4 Assignment 1
Privacy or Security complaint to the office of the Civil Rights
In this assignment I have found that I had private information that was given to instructors. Therefore
I will be filling a complaint to the ORC whi
Unit 3 Discussion Bill of rights
I this assignment I will be covering and going over what my fabulous teacher taught me in
class yesterday about the bill of rights. We went over the bill of rights which is the first ten
Answer the following questions pertinent to GLBA and HIPAA privacy and security rules.
1. Which US government agency acts as the legal enforcement entity for businesses and organizations
involved in commerce?
TheFederal Trade commission
2. Which US govern
Patricio Zuniga Jr.
Assignment 10 Computer Forensics
Between 2007 and 2009, there was a data breach involving the Heartland Payment
Systems Company, which handles credit card processing. It was one of the largest Credit Card
fraud cases in history.
Patricio Zuniga Jr.
Lab #4 Analysis and Comparison of GLBA and HIPAA
3. Both are required to protect personal data, they both have to have access controls on their
networks, and they have technical hardware requirements.
4. Consumer d
Lab 9 IS3350
IT Assets Description
Privacy Data Impact
LAN to WAN
In this assignment I will be doing a risk analysis on illegal material that is downloaded of
the internet. There are many risks in doing such a thing for one it is breaking the law.
Downloading music, games, mov
Unit 9 Assignment 1 Executive Summary on Risk Mitigation
In this assignment I will be creating and executive summary on risk analysis .When dealing with
risk assessment there are many different things to account for. Everything in
1.Define cyber stalking.
Means using electronic communications to harass or frighten someone. Sending emails that threating
people is a good example
2. Define cyber bullying.
Is the intent to harm another person on the web. It
Unit 8 Assignment 1
In this assignment I will be reviewing a case study by Verizon that is analyzing
cybercrimes. This case study is to identify what breaches are most used for cybercrimes. It also
Week 7 Lab
1. What was the premise behind the Recording Industry Association of Americas lawsuit against
Napster users were directly infringing the plaintiffs copyright.
Napster was liable for contributory infringement of t
Unit 7 Discussion
Copyright and its Various Owner Rights
In this assignment I am a rapper (Ampp Breal) and I have the number one song in the
country and I am expecting I large amount of revenue. As I talk to my sales manager Robin s
Violation of copyright privileges
Here are some of my findings
Fines for not abiding
In this assignment I will explain intellectual properties laws that were violated in my case
from the discussion and I will