Fill in order details

  • Submit your instructions
    to writers for free!

Chat with the writer

  • Chat with preferred expert writers
  • Request a preview of your paper
    from them for free

Editing

  • Project edited by the quality evaluation department

Download Your Completed Project

  • Download the completed project from your account or have it sent to your email address

How does examining the history of the formation of the

Cyber Laws and Ethical Hacking Essay

Ethical hacking is oxymoronic by definition, since ethical hacking is considered legal, but requires the breaking of a system to pinpoint vulnerabilities.

  1. Research cyber laws within your state. Apply the processes and goals of cyber investigations to the concept of ethical hacking from a theological, as well as an industry ethical standpoint from either NIST or ISC2.
  1. Research should include at least three academic sources outside of required reading and should be current (published within the past five years).

In a 500- to 750-word essay, address the following:

  1. Current cyber laws, both federal and state.
  2. The processes and goals of a cyber investigation as they relate to the concept of ethical hacking.
  3. Justification for cyber laws from a Christian, industry, and government point of view.
  4. Explanation of how ethical foundations are applied to situations arising from the interconnected world.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Course Materials if you need assistance.

Legal/Ethical Issues of Social Engineering

Most individuals have at one time or another received a phishing email claiming to be from someone of great importance who needs money and, if transferred, will ensure personal riches for the sender. Although it is known that these emails are frauds, unfortunately, they sometimes do work! This is not the only scam being perpetrated either; for example, fake PayPal, Bank of America, etc. phishing emails are abundant.

Scenario: We have targeted a company with 1,000 employees spread out over five locations. In this instance, we have discovered that the company deals with insurance claims for the health care industry. As most know, health care companies or companies that deal with private health care information must be compliant to certain government regulations, including HIPAA.

Your job is to design a Social Engineering Scenario (pretext) that will be used for employee training to combat phishing.

  1. Research the applicable federal and state cyber laws in regards to phishing or pretext.
  2. Using the research, design a social engineering pretext, making it as realistic as possible, that includes applicable federal and state cyber laws. Your pretext should reflect industry-standard technical writing.
  3. In a 500- to 750-word document, describe the role of cybersecurity in supporting and encouraging ethics, as well as where cybersecurity practices can cause ethical conflicts, such as social engineering pretext scenarios.
  4. Refer to the required readings for additional insight into the development of a pretext.

Prepare this assignment according to the guidelines found in the APA Style Guide located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Course Materials if you need assistance. 

Topic 6 DQ 1

How does examining the history of the formation of the internet shape the security concerns in today’s digital environment? If you could change one historical fact of the internet’s development, what would that be? How might that one fact change the security of the internet?

What our customers say
_____

error: Content is protected !!