Jumpstart Your Paper

Browse our Free Essay examples and check out our Writing tools to get your assignments done.

Identifying Computer Statutes

INSTRUCTIONS:

For this activity, you use Internet search engines to gather information on computer crime in your state or country (or a location selected by your instructor). You have been hired by ExecuTech, a security consulting company, to gather information on any new statutes or laws that might have an impact on the security testers they employ. Write a one-page memo to Bob Lynch, director of security and operations, listing any applicable statutes or laws and offering recommendations to management. For example, you might note in your memo that conducting a denial-of-service attack on a company’s network is illegal because the state’s penal code prohibits this type of attack unless authorized by the owner.   Federal Laws You should also be aware of applicable federal laws when conducting your first security test (see Table 1-2). Federal computer crime laws are getting more specific about cybercrimes and intellectual property issues. In fact, the government now has a new branch of computer crime called “computer hacking and intellectual property (CHIP).”     Q2.  Examining Federal Computer Crime Laws (~250 Words) Objective: Increase your understanding of U.S. federal laws related to computer crime. Description: For this activity, use Internet search engines to gather information on U.S. Code, Title 18, Sec. 1030, which covers fraud and related activity in connection with computers. Write a summary explaining how this law can affect ethical hackers and security testers.   Q3. Understanding a Consulting Contract (~ 300 words) Objective: Increase your understanding of a consulting contract. Description: For this activity, review the sample contract shown in Appendix B. This contract can’t be used unless you’re a member of the ICCA, but it’s an excellent example of how a contract might be worded. After reading the contract, write a one-page summary discussing the areas you would modify or add to. Include any sections important for a penetration tester that are missing.   Appendix B: Ruhl, Janet. The Computer Consultants Guide. Wiley, 1997. ISBN 0471176494. Meyer, Peter. Getting Started in Computer Security. Wiley, 1999. ISBN 0471348139. Paioff, Mitch. Getting Started as an Independent Computer Consultant. Consulting Training Institute, 2008. ISBN 978-0-98192-970-5. Weiss, Alan. The Consulting Bible: Everything You Need to Know to Create and
Related Topics: