Computer Science Homework Help
CMP 610 UMGC Privacy Awareness and Cybersecurity Report
Step 5: Compose a Privacy Awareness Report (3 pages)
Following the report on the impact of social psychology on cybersecurity, you will compose a report on privacy awareness and the implications on cybersecurity policy to further prepare for the discussion with your peers. This report will be used to formulate recommendations later in the project and be included as an appendix to the final presentation in the last step of this project.
In this report, complete the following:
Define ECPA (Electronic Communications Privacy Act) and explain how it affects cybersecurity today. Give an example of how it might come into play at your organization. Suggest how policy at your organization could support ECPA compliance.
Define FISA (Foreign Intelligence Surveillance Act) and explain how it affects cybersecurity today. Give an example of how it might come into play at your organization. Suggest how policy at your organization could support FISA compliance.
Identify any other privacy law that may affect your assigned organization. Give a brief summary of what the law does, how it affects your organization, and how policy could support compliance.
- Step 6: Compile an Anonymity Report (4 pages)
- To go along with the reports on the impact of social psychology on cybersecurity and the impact of privacy awareness on cybersecurity policy, you will now report on the implication anonymity has on cybersecurity by giving a brief one-paragraph summary on each of the items within the bulleted list below.
- Each summary should include a definition, and explanation of how the term relates to the organization, and an explanation of how you will integrate it into the policy recommendations. This report will be used to formulate recommendations in Step 10 and be included as an appendix to the final presentation in Step 12. Review introduction to the internet, a closer look at the World Wide Web, web markup languages, and web and internet services for basic information.
pseudonymity
IP spoofing (IP spoofing and packet sniffing at the network layer)
- types of encryption
Instructor Expectation:
STEP 5 – cover page – Privacy Awareness Report
-Intro
- – 1 para define ECPA in terms of how it affects cybersecurity and then how it affects your organization. End with how your policy supports ECPA compliance.
– 1-2 para – Define FISA and how it affects cybersecurity, how it is relevant to your organizations policy. give specific examples.
- -1 para – Give an example of any privacy law and how it affects your organization. I’m looking for summary of the law, how it affects your org and how your policy supports compliance of this law.
Conclusion References.
- STEP 6 – Anonymity Report
– Cover page
- -Intro – the impact of anonymity
– 6 paragraphs: each para has definition, how the term relates to your org, how you will integrate into your policy (1 ea: pseudonymity, IP spoofing, SMTP, Web filters, types of encryption, remailers
- – Conclusion
-References