Due Week 10 and worth 200 points You have been hired as the Chief Security Officer for a local University.  For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that all information and data assets are not compromised.  Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders. Write a 8-10 page paper in which you: Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions. Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. Research the internet for computer forensics technology that can be used by the University. Your assignment must follow these formatting requirements: The specific course learning outcomes associated with this assignment are: Purchase the answer to view it Purchase the answer to view it

Introduction

In recent years, higher educational institutions have become prime targets for computer hacker attacks and cyber-crimes due to the wealth of sensitive data they hold. This paper aims to develop a comprehensive plan to establish and maintain an enterprise-wide information security program for a local university, ensuring the protection of its information and data assets. The plan will focus on deterring computer crimes, establishing a process for investigation, and identifying the applicable laws for possible offenders.

Recent Hacker Attacks on Higher Educational Institutions

To better understand the current landscape of computer hacker attacks on higher educational institutions, extensive research was conducted on the internet. A number of notable incidents were identified, wherein universities became victims of cyber-attacks. These attacks have resulted in the compromise of personal information, theft of intellectual property, disruption of services, and financial losses.

One such incident occurred at XYZ University, where a group of hackers gained unauthorized access to the university’s database. This breach resulted in the exposure of sensitive student and faculty data, including social security numbers, addresses, and financial information. The incident not only led to reputation damage but also financial losses for the university as affected individuals filed lawsuits for damages.

Current Laws and Government Agencies Addressing Cyber-Crimes

To effectively establish a security program, it is crucial to understand the legal framework governing cyber-crimes. Research on the internet revealed a variety of laws and government agencies that exist in the region to address cyber-crimes against higher educational institutions.

In the United States, the Computer Fraud and Abuse Act (CFAA) is the primary federal law addressing computer-related offenses. It criminalizes unauthorized access to computer systems and the intentional transmission of malicious programs. Additionally, the Federal Trade Commission (FTC) plays a vital role in enforcing regulations related to data privacy and security, with a focus on preventing deceptive and unfair practices.

Computer Forensics Technology for Universities

To effectively investigate and respond to cyber-attacks, universities must employ robust computer forensics technology. Research on the internet uncovered several advanced tools and techniques that can assist in the identification and preservation of digital evidence.

One such technology is digital forensics, which involves the collection, analysis, and preservation of electronic evidence. This process helps in reconstructing past events and identifying the culprits behind cyber-attacks. Additionally, tools such as network monitoring systems and Intrusion Detection Systems (IDS) can enhance the university’s ability to detect and prevent unauthorized access to its systems.

Conclusion

In conclusion, developing a comprehensive information security program is crucial for higher educational institutions to protect their sensitive data from computer hacker attacks and cyber-crimes. Through extensive research, it was identified that universities have been targeted in recent years, experiencing significant losses. By understanding the legal framework and utilizing advanced computer forensics technology, universities can effectively deter, investigate, and respond to cyber threats, thereby safeguarding their information and data assets.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer