1.This week students will look at some of the different cybercrimes, how to develop a security policy and various security and privacy regulations
Identify various cybercrimes
Read textbook chapter 4
Ajayi, E. F. G. (2016). Review Challenges to enforcement of cyber-crimes laws and policy. Journal of Internet and Information Systems, 6(1), 1-12.10.5897/JIIS2015.0089 https://academicjournals.org/journal/JIIS/article-full-text-pdf/930ADF960210
2. students will examine some of the different types of cryptographic attacks such as those on social media platforms.
Read: Textbook: Chapters 7 and 8
Franchi, Enrico & Poggi, Agostino & Tomaiuolo, Michele. (2017). Information and Password Attacks on Social Networks: An Argument for Cryptography. Journal of Information Technology Research, 8. 25-42. 10.4018/JITR.2015010103 https://pdfs.semanticscholar.org/9f00/15e099290d0ba1584b82517e044de1413bcc.pdf
Tabari, A. Z., & Ou, X. (2020). A First Step Towards Understanding Real-world Attacks on IoT Devices. https://arxiv.org/abs/2003.01218 There is a link to the PDF of this article in the right column of this record under Download.
Select your paper details and see how much our professional writing services will cost.
Our custom human-written papers from top essay writers are always free from plagiarism.
Your data and payment info stay secured every time you get our help from an essay writer.
Your money is safe with us. If your plans change, you can get it sent back to your card.
We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.
Get instant answers to the questions that students ask most often.
See full FAQ