Cyber Security
Define and evaluate the information technology business model of the organization.
Analyze the precise cyber-security laws, private and public laws, state statutes, criminal and civil laws, and ethical guidelines that are pertinent to the organization.
Evaluate the current cyberlaws, regulations, and policies within the organization as they relate to the organization’s information systems.
Cyberlaw crimes
a) Evaluate how cyber-related crimes should be investigated and handled within an organization.
b) Analyze the impact that these cyber-crimes can have on an organization’s information technology structure.
c) Evaluate the appropriate information security measures that should be in place to safeguard an organization’sinformation.
Cyber-crime and e-commerce
a) Analyze the organization’s current information systems security measures in place that allow users to access the organization’s data.
b) Evaluate the current cyberlaws to ensure that they protect the organization’s data against outside intrusion.