Overview
You have been called back by the CISO to report your findings and pursue the next steps of your investigation. During your investigation it was discovered that the estranged husband of the CEO’s executive staff assistant had compromised her system’s account, which allowed him to access confidential documents including other employees’ personally identifiable information. You have completed your forensics investigation and documented the findings in an incident report, and continue to maintain and secure evidence in the pursuit of criminal and civil charges.InstructionsWith the information ascertained during your investigation, and utilizing knowledge of network architectures and standards relevant to network investigations, write a 3-5 page paper responding to the points listed below. You may utilize the resources from your study this week to analyze appropriate U.S. Supreme Court cases, federal laws, and federal statutes.Analyze at least three of the significant U.S. Supreme Court cases focusing on digital crime and evidence. To support your work, reference the federal laws that were violated and the basis for the case (that is, summarize the case).Analyze at least three federal statutes governing electronic surveillance in a communications network that can be applied to this case. To support your work, refer to the statutes listed in the Electronic Communications Privacy Act (ECPA).Summarize the roles and responses of federal law enforcement agencies and any interagency partnerships concerning cybercrimes.Describe at least three factors that have limited the efforts of local law enforcement to identify and investigate cybercrime.Provide three sources to support your writing in addition to the textbook. Choose sources that are credible, relevant, and valid. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.The specific course outcome associated with this assignment is:Evaluate the effectiveness of applications of cybersecurity in preventing crime and abuse.
Week 10 Assignment – Developing Cybercrime Legislation, Enforcement, and Investigation | ||
---|---|---|
Criteria | Ratings | Pts |
26.4 to >23.75 ptsExemplaryAnalyzes at least three significant U.S. Supreme Court cases focusing on digital crime and evidence. 23.75 to >21.11 ptsCompetentDescribes significant U.S. Supreme Court cases focusing on digital crime and evidence. 21.11 to >18.47 ptsNeeds ImprovementLists significant U.S. Supreme Court cases focusing on digital crime and evidence. 18.47 to >0 ptsUnacceptableDoes not list any significant U.S. Supreme Court cases focusing on digital crime and evidence. |
/ 26.4 pts |
|
27.6 to >24.83 ptsExemplaryAnalyzes at least three federal statutes that govern electronic surveillance in a communications network that can be applied to this case. 24.83 to >22.07 ptsCompetentDescribes federal statutes that govern electronic surveillance in a communications network that can be applied to this case. 22.07 to >19.31 ptsNeeds ImprovementLists federal statutes governing electronic surveillance in a communications network. 19.31 to >0 ptsUnacceptableDoes not list any federal statutes governing electronic surveillance in a communications network. |
/ 27.6 pts |
|
27.6 to >24.83 ptsExemplarySummarizes the roles and responses of federal law enforcement agencies and any interagency partnerships concerning cybercrimes. 24.83 to >22.07 ptsCompetentDescribes the roles and responses of federal law enforcement agencies and any interagency partnerships concerning cybercrimes. 22.07 to >19.31 ptsNeeds ImprovementLists the roles and responses of federal law enforcement agencies and any interagency partnerships concerning cybercrimes. 19.31 to >0 ptsUnacceptableDoes not list the roles and responses of federal law enforcement agencies and any interagency partnerships concerning cybercrimes. | ||
26.4 to >23.75 ptsExemplaryDescribes at least three factors that have limited the efforts of local law enforcement to identify and investigate cybercrime. 23.75 to >21.11 ptsCompetentExamines one to two factors that have limited the efforts of local law enforcement to identify and investigate cybercrime. 21.11 to >18.47 ptsNeeds ImprovementIdentifies factors that have limited the efforts of local law enforcement to identify and investigate cybercrime. 18.47 to >0 ptsUnacceptableDoes not identify factors that have limited the efforts of local law enforcement to identify and investigate cybercrime. | ||
6 to >5.39 ptsExemplaryMeets the required number of references; all references are peer-reviewed, academic references. 5.39 to >4.79 ptsCompetentMeets the required number of references; some or all references are not peer-reviewed, academic references. 4.79 to >4.19 ptsNeeds ImprovementDoes not meet the required number of references; some or all references are not peer-reviewed, academic references. 4.19 to >0 ptsUnacceptableNo references provided. |
/ 6 pts |
|
6 to >5.39 ptsExemplaryWriting has very few spelling, punctuation, and grammatical errors; few fragments, comma splices, and run-on sentences. 0–2 errors present. 5.39 to >4.79 ptsCompetentWriting has spelling, punctuation, and grammatical errors that are distracting in a few places; few fragments, comma splices, and run-on sentences. 3–4 errors present. 4.79 to >4.19 ptsNeeds ImprovementWriting has spelling, punctuation, and grammatical errors that are distracting in some places. 5–6 errors present. 4.19 to >0 ptsUnacceptableWriting has spelling, punctuation, and grammatical errors, fragments, comma splices, and run-on sentences that distract from the message. More than 6 errors present. | ||
Total Points: 0 |