[SOLVED] Cyber Law Short Questions

Q1. There are a lot of strategies for setting up network defense systems. Physical restrictions can be put in place, such as separating hardware, or using switches and cabling to do so. One can also use virtualized segmentation in the form of VLANs, and virtual networks (including switches). What strategy do you feel is best suited to defend against modern cybersecurity threats? State your opinion concerning which technologies you would deploy if you were positioned to protect the GCU campus from cybersecurity threats. (~200 words)   Q2. There are hundreds of thousands of potential cybersecurity attacks, which exist in the form of hackers, viruses, malware, ransomware, and other vectors. The most effective way of mitigating their effects is identifying them before they can become active. What modern security methods and tools can be used to do this? Why are they not 100% effective? Explain your rationale. (~200 words)   Q3. The Children’s Online Privacy Protection Act (COPPA) was passed in 1998 and established the first framework for online privacy protection for children under 13 who use the Internet. Essentially, COPPA mandates what personal and marketing information, if any, webmasters can collect from minors and details what must be disclosed in a privacy policy. Given the expansive nature of data collection and widespread use of Internet connected devices, should COPPA be expanded to: (1) children who are 13-18 years old or (2) all citizens utilizing the Internet? Why or why not? How would your answer affect/align with business objectives? (~250 words) Q4. Information privacy or data protection laws are generally designed to prohibit publication or misuse of information about private individuals. Many countries around the world, including all of Europe, have adopted some form of comprehensive data protection legislation. In the United States however, there is no single, comprehensive law regulating the collection and use of personal data on the federal level. Instead, there is a patchwork system of federal and state laws and regulations that can sometimes overlap or contradict one another. Thus, governmental agencies and industry groups have developed self-regulatory guidelines and frameworks or “best practices” that are increasingly being used as a tool for enforcement by regulators. Some of the most notable federal privacy laws include the following: 1.     The Federal Trade Commission Act 2.     The Financial Services Modernization Act 3.     The Health Insurance Portability and Accountability Act 4.     The Fair Credit Reporting Act 5.     The Controlling the Assault of Non-Solicited Pornography and Marketing Act 6.     Telephone Consumer Protection Act 7.     The Children’s Online Privacy Protection Act 8.     The Electronic Communications Privacy Act 9.     The Judicial Redress Act In October 2016, under the Obama administration, the Federal Communications Commission (FCC) adopted a set of privacy rule for broadband ISP providers that established a framework of customer consent required for ISPs to use and share their customers’ personal information that was calibrated to the sensitivity of the information. The rules would have incorporated the controversial inclusion of browsing history and apps usage as sensitive information, requiring opt-in consent. They also would have included data security and breach notification requirements. The Federal Trade Commission (FTC), which oversees consumer privacy compliance for other companies, does not currently treat consumer browsing history or apps usage as sensitive data. On April 3rd, 2017, President Donald Trump signed into law a bill that repealed those privacy and data security regulations. Given the pervasive amount of user information that is collected, stored, and shared, (1) do you think Internet browser history and app usage should be considered “sensitive data,” and if so, (2) should the FCC Privacy Policy Rule have been repealed? Discuss why the United States has been reluctant to pass comprehensive broad data and privacy protection laws. (~250 words) Note: Please add at least one scholar reference to each question.

Don't use plagiarized sources. Get Your Custom Essay on
[SOLVED] Cyber Law Short Questions
From $8/Page
Order Essay

Calculate the price of your paper

Total price:$26
Our features

Top Homework Writers is here for any paper writing help you need!

Need a better grade?
Top Homework Writers got you covered.

Order your paper