[Solved] Discuss what may be wrong and what further steps you can possibly take to ensure complete eradication.

Companies such as CardSystem solutions are not explicitly covered under any federal regulation to ensure they are in compliance with security best practices. Therefore, this is going to fuel further debate for more stringent and wide-sweeping legislation. The Gramm-Leach-Bliley Act was designed to cover financial institutions and gives the Federal Trade Commission the power to enforce security guidelines, but third-party processing firms are not bound to any security guideline except by contractual agreement. However, in light of the recent security breaches, there are already calls to include any entity that’s dealing with sensitive financial information under the Gramm-Leach-Bliley Act to ensure compliance with security best practices.

  • Describe a layered security approach that would prevent easy access to the information stored on CardSystem’s servers.
  • Explain what measure could have allowed earlier detection of fraudulent activity, and aided in the investigation and why?
  • Analyze what could have prevented a program being installed that allowed access to customer files.
  • Describe the difficulty in adapting legislation to meet emerging business models in the information age.

Part 3: Ad-Ware and Forensics

Based on your learning of this week, respond to the following:

  • Imagine that your computer has been infected with an Ad-Ware. You systematically follow steps to remove the Ad-Ware. You have used commercially available antispyware software, but to no avail. Discuss what may be wrong and what further steps you can possibly take to ensure complete eradication.
  • Scan the popular press for computer crime cases. Gather information on the kinds of evidence that was collected, its usefulness in apprehending the culprit, and emergent problems and concerns, if any. Draw lessons and present best practices for computer forensics.

Part 4: Research Case Study

Using the Argosy University Online Library and the Internet, provide a significant case study that reports about one of the issues discussed during the course. Ensure that, if you wish to deviate from the topics discussed, the overall direction of the material still fits under the greater umbrella of computer security. The case study can be from a peer-reviewed journal or from a textbook. Try to find something close to your area of interest professionally. This will help you act as a computer security expert. After successfully providing a case study, create a report that includes:

  • A short introduction to the case study.
  • A set of five questions designed by you, highlighting the key points discussed in the case study.
  • Answers to the questions you designed, explaining the key points of your interest for this particular case. Your report should include references and links to relevant Web sites. Support your responses with examples.Cite any sources in APA format.

Submission Details:

Name your document AUO_IST443_M5_A2_LastName_FirstInitial.doc.

 

“#“”

Essay Writing Service

"Looking for a Someone to write this Paper for you? Let our writers help and Get a Discount!

[opskill_register_order]

Get better grades effortlessly,
It’s cheaper than you might think

Effortlessly get the essays and grades you need. You can now get any essay, on any subject and at ANY deadline with just 10 minutes of your time (or less). Your professor will love you for it!