Categories
Computer Science

ENTERPRISE CYBER SECURITY

Please review the following REQUIREMENTS and address all the points in the MUST HAVE section.
Please pay attention to each sections page requirements and headings.
Total Pages 30 and 20 References in APA 7 Format (excluding cover page and references page)
PART # 1 – Cybercrime Laws
6 Pages with 4 credible references in APA 7 Format
REQUIREMENTS:
Many cybercrime laws have been enacted over the past few decades. Which one these laws do you believe is the most effective cybercrime law available to law enforcement? Support your arguments by discussing two cases from the past 12 months in which the law was used to prosecute the perpetrators. You may select a federal/state law or a provision targeting a specific cybercrime.
MUST HAVE
Cybercrime laws – Overview
Cybercrime laws – History
Most effective cybercrime law available to law enforcement
List two cases from the past 12 months in which the law was used to prosecute the perpetrators.
Case # 1 – Overview with Detail Implementation
Case # 2 – Overview with Detail Implementation
Conclusion
PART # 2 – Electronic Frontier Foundation
6 Pages with 4 credible references in APA 7 Format
REQUIREMENTS:
The Electronic Frontier Foundation is one of the leading nonprofit organizations defending civil liberties in the digital world. In a written paper do the following:
• Using a Web browser, go to www.eff.org
MUST HAVE
Electronic Frontier Foundation (www.eff.org) – Overview
Purpose
Current top concerns of this organization
Top Concern # 1 with Detail explanation for this concern.
Top Concern # 2 with Detail explanation for this concern.
Top Concern # 3 with Detail explanation for this concern.
Conclusion
PART # 3 – Risk Management
6 Pages with 4 credible references in APA 7 Format
REQUIREMENTS:
Risk management has become more of a concern to senior leaders in organizations over the years. In a written paper, answer the following questions:
MUST HAVE
Risk management – Overview
Components of Risk management
Risk Identification
Risk Assessment
Risk Control
Why is the identification of risks and vulnerabilities to assets so important in risk management?
Conclusion
PART # 4 – IDS / IPS
6 Pages with 4 credible references in APA 7 Format
REQUIREMENTS:
An Intrusion Detection System (IDS)/ Intrusion Prevention System (IPS) can be an invaluable tool if used correctly in the organization to minimize hacks. Using the Internet, search for currently available commercial IDS/IPS systems.
In a written paper, answer the following questions:
MUST HAVE
Intrusion Detection System (IDS) – Overview
Intrusion Prevention System (IPS) – Overview
Intrusion Detection and Prevention System (IDPS) – Overview
What classification systems and descriptions are used?
List currently available commercial IDS/IPS systems
How can they be used to compare the features and components of each IDS/IDP?
Conclusion
PART # 5 – Physical Security
6 Pages with 4 credible references in APA 7 Format
REQUIREMENTS:
In a written paper answer the following questions:
MUST HAVE
Information and Cyber Security – Overview
What is physical security?
What are the primary threats to physical security?
Threat #1 (for example, Physical Access Control)
Threat #2 (for example, Fire Security and Safety)
Threat #3 (for example, Interception of Data)
Threat #4 (for example, Mobile and Portable systems security)
Threat #5 (for example, Other)
How are these threats manifested in attacks against the organization?
Conclusion

QUICK QUOTE

Approximately 250 words