Cybersecurity Governance

Cybersecurity Governance

Step 6: Computer Crime Comparison Table

Now that you have identified CFAA clones from at least three states, you will compare and contrast them with one another and the CFAA. Be sure to include specific vulnerabilities that the statutes are intended to address regarding computer access. Document your conclusions in the first section of the Computer Crime Comparison Table titled “Statute Comparisons.” This table will aid you in developing your solutions.

Submit your table for feedback.

 

Step 5: Identify State Statutes

Now that you have analyzed the federal statute addressing computer fraud and abuse, you will identify computer crime statutes, or Computer Fraud and Abuse Act state clones from three different states. Note and review these statutes carefully as you will use them in the following step.

Leave a Comment

Your email address will not be published. Required fields are marked *

Cybersecurity Governance

Cybersecurity Governance

Congressional Written and Oral Statements
Step 4: Write the CFAA Analysis

After completing your research on the Computer Fraud and Abuse Act, write a one- to two-page analysis of the statute and its effectiveness. This analysis will be Exhibit A for the final assignment.

Include in your analysis:

  1. a background of the CFAA
  2. examples of how the CFAA might positively address the general misuse of computer systems and reduce computer crime
  3. examples of abuses and overreaching by government in applying the law
  4. discussion of how effective the CFAA is in protecting organizations from cyberattacks

Submit your written analysis for feedback.

 

                                   Step 3: Research the Background of the CFAA

Now that you have an overview of cybercrime awareness and how organizations can comply with laws and regulations and reduce regulatory risk, you are ready to look more closely at specific statutes. Begin by researching the current version of the Computer Fraud and Abuse Act (CFAA). Your research will provide the basis for your analysis in the next step.

Your analysis will include:

  1. background of the CFAA
  2. examples of how the CFAA might positively address the general misuse of computer systems and reduce computer crime
  3. examples of abuses and overreaching by government in applying the law
  4. discussion of how effective the CFAA is in protecting organizations from cyberattacks

 

 

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top