1. BI dummy accounts used to infiltrate and access confidential TechFite documents in various departments. 2. Penetration of various internet-based company networks. 2. Violation of ECPA: Use of TechFite staff and systems to surveille the network traffic of other companies. 3. Violation of SOX: Falsification of sales data using fake client ...
Task 1 - TechFite Case Study Task 2 - A1. CFAA and ECPA 1 ...
1. TechFite didnotimplementchecksandbalances. Administrator rights were granted to all computers. User accounts were never audited, allowing for escalation of privilege and fraudulent accounts. 2. TechFite did not employee a Chinese wall to separate client information or the information of different departments within the organization. The ...
Passed ! C841 - Legal Issues in Information Security : r/WGU
PRINT out the casestudy and the task guidance. The task guidance has multiple tabs. One tab summarizes each of the paragraphs in the casestudy (EXCELLENT for checking your understanding of the paragraph).
Legal Analysis of TechFite’s Case Report
Legal Analysis of TechFite’sCase Report The following is a legal analysis to determine if there has been any illegal activity with regards to TechFite’s current operations, according to the provided case report. The report was filed by an Information Security Specialist with 12 years of experience in Cybersecurity, and a
Improving TechFite's Information Security: Ethical Guidelines
TechFite Case Study Legal Analysis Task 2 4 Megan Rogers and Jack Hudson (Analysts) were instructed by Ms. Miller to carry out functions that violated any code of ethics in the technology realm. This team even used the Metasploit tool to intercept IP address for several other companies as well.
C841 Legal Issues in Information Security Task 2.docx
A2: Description of Unethical Behaviors: There were a number of individuals and groups within TechFite whose behavior was unethical. The head of the Applications Division, Carl Jaspers, failed to safeguard sensitive data, encouraged immoral surveillance techniques and had a relationship with IT Security Analyst Nadia Johnson that represented a ...
IT C841 : Legal Issues in Information Security - Western ...
TechFiteCaseStudy paper 2.docx. TASK 1: LEGAL ANALYSIS LEGAL ISSUES IN INFORMATION SECURITY — C841 A. Demonstrate your knowledge of application of the law by doing the following: 1. Explain how the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act each specifica
C841 IHP4 Task 2 (pptx) - CliffsNotes
Applicability: Jack Hudson, IT Analyst with Techfite, coordinated efforts by third parties to gather intelligence by mining other companies' trash going against the code of ethics against everything in the first Code of Ethics Canon.
C841 - Task 2 Legal Issues in Information Security - Studocu
TechFite violates point two due to a lack of access control, auditing users' accounts, checking for escalation of privilege, imposing data loss prevention (DLP) on sensitive documents, and monitoring internal network traffic and activity, all of which are mentioned in the case study.
IMAGES
VIDEO
COMMENTS
The Techfite case study discussed in the document highlights the importance of having a strong code of ethics policy in place to foster a healthy work.
1. BI dummy accounts used to infiltrate and access confidential TechFite documents in various departments. 2. Penetration of various internet-based company networks. 2. Violation of ECPA: Use of TechFite staff and systems to surveille the network traffic of other companies. 3. Violation of SOX: Falsification of sales data using fake client ...
1. TechFite did not implement checks and balances. Administrator rights were granted to all computers. User accounts were never audited, allowing for escalation of privilege and fraudulent accounts. 2. TechFite did not employee a Chinese wall to separate client information or the information of different departments within the organization. The ...
PRINT out the case study and the task guidance. The task guidance has multiple tabs. One tab summarizes each of the paragraphs in the case study (EXCELLENT for checking your understanding of the paragraph).
Legal Analysis of TechFite’s Case Report The following is a legal analysis to determine if there has been any illegal activity with regards to TechFite’s current operations, according to the provided case report. The report was filed by an Information Security Specialist with 12 years of experience in Cybersecurity, and a
TechFite Case Study Legal Analysis Task 2 4 Megan Rogers and Jack Hudson (Analysts) were instructed by Ms. Miller to carry out functions that violated any code of ethics in the technology realm. This team even used the Metasploit tool to intercept IP address for several other companies as well.
A2: Description of Unethical Behaviors: There were a number of individuals and groups within TechFite whose behavior was unethical. The head of the Applications Division, Carl Jaspers, failed to safeguard sensitive data, encouraged immoral surveillance techniques and had a relationship with IT Security Analyst Nadia Johnson that represented a ...
TechFite Case Study paper 2.docx. TASK 1: LEGAL ANALYSIS LEGAL ISSUES IN INFORMATION SECURITY — C841 A. Demonstrate your knowledge of application of the law by doing the following: 1. Explain how the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act each specifica
Applicability: Jack Hudson, IT Analyst with Techfite, coordinated efforts by third parties to gather intelligence by mining other companies' trash going against the code of ethics against everything in the first Code of Ethics Canon.
TechFite violates point two due to a lack of access control, auditing users' accounts, checking for escalation of privilege, imposing data loss prevention (DLP) on sensitive documents, and monitoring internal network traffic and activity, all of which are mentioned in the case study.