Assignment 3: Protecting Confidential Information
Question # 00487897
Posted By:
Updated on: 02/21/2017 12:24 AM Due on: 02/21/2017
Assignment 3: Protecting Confidential Information
It is becoming more common for data to be released to unauthorized parties. With an increasingly digitized world with networked computers, data breaches are a growing concern. The Privacy Rights Clearinghouse reports that more than 500,000,000 sensitive records were breached between January 2005 and August 2010 in the United States alone (Stevens, 2012).Data breaches can include theft or loss of digital media, including computer tapes, hard drives, or laptop computers. The criminals look for data on these computer networks. Some of the information on these computer networks includes the following:
from http://www.law.u.edu/marshall/crsreports/crsdocuments/
R42475_04102012.pdfAssignment 3 Grading CriteriaMaximum PointsWrote a complete and accurate definition of digital forensics and included appropriate scholarly sources.24Wrote a thorough and accurate explanation of data breach and included a summary of the legal and criminal issues related to data breaches, supported the explanation using at least two examples, and cited references of at least three specific pieces of information.24Illustrated the plan to protect the organization against possible data breaches and included specific points and measurable goals.32Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in the accurate representation and attribution of sources; and displayed accurate spelling, grammar, and punctuation.20Total:
It is becoming more common for data to be released to unauthorized parties. With an increasingly digitized world with networked computers, data breaches are a growing concern. The Privacy Rights Clearinghouse reports that more than 500,000,000 sensitive records were breached between January 2005 and August 2010 in the United States alone (Stevens, 2012).Data breaches can include theft or loss of digital media, including computer tapes, hard drives, or laptop computers. The criminals look for data on these computer networks. Some of the information on these computer networks includes the following:
- Personal health information
- Financial information, such as credit card or bank details
- Trade secrets
- Information that is otherwise considered private
- An explanation of digital forensics and what a data breach is, along with real-life examples
- Your plan for the organization to safeguard against possible data breaches
- Define digital forensics.
- Explain what a data breach is. Include a summary of legal and criminal issues related to data breaches. Support your explanation using at least two real-life examples of data breaches. Include citations from each of this module's readings.
- Illustrate your plan to protect your organization against possible data breaches. Include specific points and measurable goals.
- ByWednesday, February 22, 2017, save the Microsoft PowerPoint presentation as M1_A3_Lastname_Firstname.ppt and submit it to theM1 Assignment 3 Dropbox.
from http://www.law.u.edu/marshall/crsreports/crsdocuments/
R42475_04102012.pdfAssignment 3 Grading CriteriaMaximum PointsWrote a complete and accurate definition of digital forensics and included appropriate scholarly sources.24Wrote a thorough and accurate explanation of data breach and included a summary of the legal and criminal issues related to data breaches, supported the explanation using at least two examples, and cited references of at least three specific pieces of information.24Illustrated the plan to protect the organization against possible data breaches and included specific points and measurable goals.32Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in the accurate representation and attribution of sources; and displayed accurate spelling, grammar, and punctuation.20Total:
-
Rating:
/5
Solution: Assignment 3: Protecting Confidential Information