100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Samenvatting

SUMMARY C841- Task-1 Running head: TECHFITE CASE STUDY LEGAL ANALYSIS C841: Legal Issues in Information Security.

Beoordeling
-
Verkocht
1
Pagina's
9
Geüpload op
18-01-2023
Geschreven in
2022/2023

SUMMARY C841- Task-1 Running head: TECHFITE CASE STUDY LEGAL ANALYSIS C841: Legal Issues in Information Security. TechFite Case Study Legal Analysis Upon suspicion of unethical and illegal activity, board of directors’ chairperson for TechFite John Jackson commissioned independent investigators to conduct a security audit of the IT and business practices of the Applications Division. At the conclusion of the investigation, several pieces of evidence pointing to wrongdoing on the part of some of the key personnel in the Applications Division were found. Specifically, damages of intellectual property rights against two potential clients of TechFite were found to have taken place as a result of malfeasance on the part of the Applications Division. This is a legal analysis of those findings and guidance for TechFite to use for corrective and perhaps legal action moving forward. A – Application of Law The principle laws relevant to this section of the analysis are Federal Statutes the Computer Fraud and Abuse Act (CFAA) and the Electronic Communications Privacy Act (ECPA). A1 – CFAA & ECPA The Computer Fraud and Abuse Act was passed and signed into law in 1986. The CFAA criminalizes certain types of damage against a “protected computer”. Under the statute, a protected computer qualifies as a computer used by the federal government, a computer used by a financial institution, and a computer used in interstate or foreign commerce. (Bailie, n.d.) Under the definition of a computer used in interstate or foreign commerce, the CFAA expands the definition of a protected computer to include the Internet because it is used to facilitate commerce between different states. The CFAA also prohibits the unauthorized trafficking of computer access information that allows people to access other computers without authorization as well as users that exceed the scope of their authorization level without granted permissions or maliciously so. The Electronic Communications Privacy Act protects the privacy of communications transfers via electronic means such as wire and radio but does not protect oral communications, paged communications, and more. It also protects communications held in electronic storage from unauthorized access. Like provisions in the CFAA, this extends to unauthorized privilege escalation with the intent to view, steal, or otherwise coopt documents and resources intended for another party. (“What is the Electronic Communications Privacy Act?,” n.d.) In the course of the TechFite investigation, it was discovered that the company conducts business via Internet and wire transfer with three possible “shell” companies and banks in This study source was downloaded by from CourseH on :40:48 GMT -06:00 TECHFITE CASE STUDY LEGAL ANALYSIS 3 different states violating the provisions set forth in the CFAA. These companies were found to be clients of TechFite on paper only and to be registered to the same entity in the state of Nevada. This entity is a man named Yu Lee that was found to be a personal acquaintance of Applications Division head Carl Jaspers. The CFAA and ECPA prohibit the unauthorized elevation of access rights to a protected computer. It was found within the TechFite Applications Division Business Intelligence Unit (BI) that computers were equipped with a sophisticated computer hacking tool called Metasploit. It was discovered that three engineers in the BI unit had been involved in the unauthorized scanning of other companies’ networks in search of IP addresses and penetration testing schemes. The second violation of both the CFAA and ECPA perpetrated was the escalation of privileges of suspected “dummy” accounts created at the direction of Carl Jaspers. These accounts were found to not have been employees of TechFite, very active via email containing evidence of malicious messaging, and used to exceed privilege levels to gain unauthorized access to sensitive material in other departments such as Human Resources and Finance. A2 - Three Laws that justify legal action Three laws that can be used in the justification of legal action are the Racketeering Influenced & Corrupt Organizations Law (RICO), the Wiretap Statutes of the Electronic Communications Privacy Act, and The Economic Espionage Act of 1996. A2a – Racketeering Influenced & Corrupt Organizations Law (RICO) RICO is a federal law designed to combat organized crime in the United States. It allows prosecution and civil penalties for racketeering activity performed as part of an ongoing criminal enterprise. (“Racketeer Influenced and Corrupt Organizations Act (RICO),” n.d.). RICO includes a long list of offenses including racketeering, money laundering, and embezzlement. These are the three aspects of RICO that apply to the TechFite case. Nearly the entire Applications Division at TechFite has been operating as a criminal organization with at least five individuals participating in illicit activities. Department head Jaspers may be involved in all three as a result of his connection to Yu Lee and his shell companies. A2b - Wiretap statutes, U.S. Code Vol.18, sec. 2510.

Meer zien Lees minder









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Geüpload op
18 januari 2023
Aantal pagina's
9
Geschreven in
2022/2023
Type
Samenvatting

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Tutorexpert01 Chamberlain College Of Nursing
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1019
Lid sinds
3 jaar
Aantal volgers
815
Documenten
5654
Laatst verkocht
2 weken geleden
BEST SELLER

Welcome All to this page. Here you will find ; ALL DOCUMENTS, PACKAGE DEALS, FLASHCARDS AND 100% REVISED & CORRECT STUDY MATERIALS GUARANTEED A+. NB: ALWAYS WRITE A GOOD REVIEW WHEN YOU BUY MY DOCUMENTS. ALSO, REFER YOUR COLLEGUES TO MY DOCUMENTS. ( Refer 3 and get 1 free document). I AM AVAILABLE TO SERVE YOU AT ANY TIME. WISHING YOU SUCCESS IN YOUR STUDIES. THANK YOU.

3.9

157 beoordelingen

5
79
4
27
3
21
2
12
1
18

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen