SlideShare a Scribd company logo
1 of 5
Assignment 4: The Future of Digital Crimes and Digital
Terrorism
Due Week 10 and worth 250 points
In the United States, a number of law enforcement agencies,
including the Secret Service, the Federal Bureau of
Investigation (FBI), and the Department of Homeland Security
among others have taken on roles to fight computer crimes and
terrorism.
Use the Internet or Strayer library to research articles on the
efforts of law enforcement agencies to combat digital crimes
and digital terrorism, as well as the roles of such agencies in the
future of the combat in question.
Write a four to five (4-5) page paper in which you:
Describe the overall impact (e.g., economic, social, etc.) of
utilizing information technologies in combatting digital crime
and digital terrorism.
Explain the existing challenges that result from the independent
nature of the law enforcement agencies within the U.S. with
regards to computer crimes and terrorism. Next, propose one (1)
strategy that the U.S. could use in order to mitigate the
challenges in question.
Explain the fundamental manner in which the U.S. could align
the efforts of federal agencies in order to better protect the
nation against digital crimes and terrorism.
Give your opinion of the key future trends in digital crime and
digital terrorism. Next, provide one (1) overall strategy that the
U.S. could use in order to combat digital crime and digital
terrorism.
Use at least four (4) quality references for this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; references must follow
APA or school-specific format.
Assignment 4: The Future of Digital Crimes and Digital
Terrorism
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Describe the overall impact (e.g., economic, social, etc.) of
utilizing information technologies in combatting digital crime
and digital terrorism.
Weight: 20%
Did not submit or incompletely described the overall impact
(e.g., economic, social, etc.) of utilizing information
technologies in combatting digital crime and digital terrorism.
Insufficiently
described the overall impact (e.g., economic, social, etc.) of
utilizing information technologies in combatting digital crime
and digital terrorism.
Partially described the overall impact (e.g., economic, social,
etc.) of utilizing information technologies in combatting digital
crime and digital terrorism.
Satisfactorily
described the overall impact (e.g., economic, social, etc.) of
utilizing information technologies in combatting digital crime
and digital terrorism.
Thoroughly
described the overall impact (e.g., economic, social, etc.) of
utilizing information technologies in combatting digital crime
and digital terrorism.
2. Explain the existing challenges that result from the
independent nature of the law enforcement agencies within the
U.S. with regards to computer crimes and terrorism. Next,
propose one (1) strategy that the U.S. could use in order to
mitigate the challenges in question.
Weight: 25%
Did not submit or incompletely explained the existing
challenges that result from the independent nature of the law
enforcement agencies within the U.S. with regards to computer
crimes and terrorism. Did not submit or incompletely proposed
one (1) strategy that the U.S. could use in order to mitigate the
challenges in question.
Insufficiently explained the existing challenges that result from
the independent nature of the law enforcement agencies within
the U.S. with regards to computer crimes and terrorism.
Insufficiently proposed one (1) strategy that the U.S. could use
in order to mitigate the challenges in question.
Partially explained the existing challenges that result from the
independent nature of the law enforcement agencies within the
U.S. with regards to computer crimes and terrorism. Partially
proposed one (1) strategy that the U.S. could use in order to
mitigate the challenges in question.
Satisfactorily explained the existing challenges that result from
the independent nature of the law enforcement agencies within
the U.S. with regards to computer crimes and terrorism.
Satisfactorily proposed one (1) strategy that the U.S. could use
in order to mitigate the challenges in question.
Thoroughly explained the existing challenges that result from
the independent nature of the law enforcement agencies within
the U.S. with regards to computer crimes and terrorism.
Thoroughly proposed one (1) strategy that the U.S. could use in
order to mitigate the challenges in question.
3. Explain the fundamental manner in which the U.S. could
align the efforts of federal agencies in order to better protect
the nation against digital crimes and terrorism.
Weight: 20%
Did not submit or incompletely explained the fundamental
manner in which the U.S. could align the efforts of federal
agencies in order to better protect the nation against digital
crimes and terrorism.
Insufficiently explained the fundamental manner in which the
U.S. could align the efforts of federal agencies in order to better
protect the nation against digital crimes and terrorism.
Partially explained the fundamental manner in which the U.S.
could align the efforts of federal agencies in order to better
protect the nation against digital crimes and terrorism.
Satisfactorily
explained the fundamental manner in which the U.S. could align
the efforts of federal agencies in order to better protect the
nation against digital crimes and terrorism.
Thoroughly explained the fundamental manner in which the
U.S. could align the efforts of federal agencies in order to better
protect the nation against digital crimes and terrorism.
4. Give your opinion of the key future trends in digital crime
and digital terrorism. Next, provide one (1) overall strategy that
the U.S. could use in order to combat digital crime and digital
terrorism.
Weight: 20%
Did not submit or incompletely gave your opinion of the key
future trends in digital crime and digital terrorism. Did not
submit or incompletely provided one (1) overall strategy that
the U.S. could use in order to combat digital crime and digital
terrorism.
Insufficiently
gave your opinion of the key future trends in digital crime and
digital terrorism. Insufficiently provided one (1) overall
strategy that the U.S. could use in order to combat digital crime
and digital terrorism.
Partially
gave your opinion of the key future trends in digital crime and
digital terrorism. Partially provided one (1) overall strategy that
the U.S. could use in order to combat digital crime and digital
terrorism.
Satisfactorily gave your opinion of the key future trends in
digital crime and digital terrorism. Satisfactorily provided one
(1) overall strategy that the U.S. could use in order to combat
digital crime and digital terrorism.
Thoroughly gave your opinion of the key future trends in digital
crime and digital terrorism. Thoroughly provided one (1)
overall strategy that the U.S. could use in order to combat
digital crime and digital terrorism.
5. 4 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx

Reply to post 1 & 2 with 150 words eachPost 1Of the six
Reply to post 1 & 2 with 150 words eachPost 1Of the six Reply to post 1 & 2 with 150 words eachPost 1Of the six
Reply to post 1 & 2 with 150 words eachPost 1Of the six felipaser7p
 
International Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docxInternational Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docxvrickens
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityTracy Clark
 
CRJ 310 Week 10 AssignmentGrading for this assignment will be ba
CRJ 310 Week 10 AssignmentGrading for this assignment will be baCRJ 310 Week 10 AssignmentGrading for this assignment will be ba
CRJ 310 Week 10 AssignmentGrading for this assignment will be bajeniihykdevara
 
CRJ 310 Week 10 AssignmentGrading for this assignment will be ba.docx
CRJ 310 Week 10 AssignmentGrading for this assignment will be ba.docxCRJ 310 Week 10 AssignmentGrading for this assignment will be ba.docx
CRJ 310 Week 10 AssignmentGrading for this assignment will be ba.docxmydrynan
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfTirthShah760404
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infrasimisterchristen
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docxbriancrawford30935
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisistamiuthomas
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital AgeYogeshIJTSRD
 

Similar to Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx (20)

Reply to post 1 & 2 with 150 words eachPost 1Of the six
Reply to post 1 & 2 with 150 words eachPost 1Of the six Reply to post 1 & 2 with 150 words eachPost 1Of the six
Reply to post 1 & 2 with 150 words eachPost 1Of the six
 
International Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docxInternational Cybersecurity Threat MatrixCountryCyb.docx
International Cybersecurity Threat MatrixCountryCyb.docx
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
 
CRJ 310 Week 10 AssignmentGrading for this assignment will be ba
CRJ 310 Week 10 AssignmentGrading for this assignment will be baCRJ 310 Week 10 AssignmentGrading for this assignment will be ba
CRJ 310 Week 10 AssignmentGrading for this assignment will be ba
 
CRJ 310 Week 10 AssignmentGrading for this assignment will be ba.docx
CRJ 310 Week 10 AssignmentGrading for this assignment will be ba.docxCRJ 310 Week 10 AssignmentGrading for this assignment will be ba.docx
CRJ 310 Week 10 AssignmentGrading for this assignment will be ba.docx
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Crime And Prevention Trends 2006
Crime And Prevention Trends 2006Crime And Prevention Trends 2006
Crime And Prevention Trends 2006
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
 
61Shackelford & Bohm - Securing North American Critical Infra
61Shackelford & Bohm -  Securing North American Critical Infra61Shackelford & Bohm -  Securing North American Critical Infra
61Shackelford & Bohm - Securing North American Critical Infra
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
 

More from astonrenna

Assignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxAssignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxastonrenna
 
Assignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxAssignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxastonrenna
 
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxAssignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxastonrenna
 
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxAssignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxastonrenna
 
Assignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxAssignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxastonrenna
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxastonrenna
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxastonrenna
 
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxAssignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxastonrenna
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxastonrenna
 
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxAssignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxastonrenna
 
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxAssignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxastonrenna
 
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxAssignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxastonrenna
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxastonrenna
 
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxAssignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxastonrenna
 
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docxAssignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docxastonrenna
 
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxAssignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxastonrenna
 
Assignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxAssignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxastonrenna
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxastonrenna
 
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxAssignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxastonrenna
 
Assignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxAssignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxastonrenna
 

More from astonrenna (20)

Assignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxAssignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docx
 
Assignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxAssignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docx
 
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxAssignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
 
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxAssignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
 
Assignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxAssignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
 
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxAssignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
 
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxAssignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
 
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxAssignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
 
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxAssignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
 
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxAssignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
 
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docxAssignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
 
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxAssignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
 
Assignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxAssignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docx
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
 
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxAssignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
 
Assignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxAssignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docx
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 

Recently uploaded (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 

Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx

  • 1. Assignment 4: The Future of Digital Crimes and Digital Terrorism Due Week 10 and worth 250 points In the United States, a number of law enforcement agencies, including the Secret Service, the Federal Bureau of Investigation (FBI), and the Department of Homeland Security among others have taken on roles to fight computer crimes and terrorism. Use the Internet or Strayer library to research articles on the efforts of law enforcement agencies to combat digital crimes and digital terrorism, as well as the roles of such agencies in the future of the combat in question. Write a four to five (4-5) page paper in which you: Describe the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism. Explain the existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Next, propose one (1) strategy that the U.S. could use in order to mitigate the challenges in question. Explain the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorism. Give your opinion of the key future trends in digital crime and digital terrorism. Next, provide one (1) overall strategy that the U.S. could use in order to combat digital crime and digital terrorism. Use at least four (4) quality references for this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format.
  • 2. Assignment 4: The Future of Digital Crimes and Digital Terrorism Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Describe the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism. Weight: 20% Did not submit or incompletely described the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism. Insufficiently described the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism. Partially described the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism. Satisfactorily described the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism. Thoroughly described the overall impact (e.g., economic, social, etc.) of utilizing information technologies in combatting digital crime and digital terrorism. 2. Explain the existing challenges that result from the
  • 3. independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Next, propose one (1) strategy that the U.S. could use in order to mitigate the challenges in question. Weight: 25% Did not submit or incompletely explained the existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Did not submit or incompletely proposed one (1) strategy that the U.S. could use in order to mitigate the challenges in question. Insufficiently explained the existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Insufficiently proposed one (1) strategy that the U.S. could use in order to mitigate the challenges in question. Partially explained the existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Partially proposed one (1) strategy that the U.S. could use in order to mitigate the challenges in question. Satisfactorily explained the existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Satisfactorily proposed one (1) strategy that the U.S. could use in order to mitigate the challenges in question. Thoroughly explained the existing challenges that result from the independent nature of the law enforcement agencies within the U.S. with regards to computer crimes and terrorism. Thoroughly proposed one (1) strategy that the U.S. could use in order to mitigate the challenges in question. 3. Explain the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorism. Weight: 20% Did not submit or incompletely explained the fundamental
  • 4. manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorism. Insufficiently explained the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorism. Partially explained the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorism. Satisfactorily explained the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorism. Thoroughly explained the fundamental manner in which the U.S. could align the efforts of federal agencies in order to better protect the nation against digital crimes and terrorism. 4. Give your opinion of the key future trends in digital crime and digital terrorism. Next, provide one (1) overall strategy that the U.S. could use in order to combat digital crime and digital terrorism. Weight: 20% Did not submit or incompletely gave your opinion of the key future trends in digital crime and digital terrorism. Did not submit or incompletely provided one (1) overall strategy that the U.S. could use in order to combat digital crime and digital terrorism. Insufficiently gave your opinion of the key future trends in digital crime and digital terrorism. Insufficiently provided one (1) overall strategy that the U.S. could use in order to combat digital crime and digital terrorism. Partially gave your opinion of the key future trends in digital crime and digital terrorism. Partially provided one (1) overall strategy that the U.S. could use in order to combat digital crime and digital
  • 5. terrorism. Satisfactorily gave your opinion of the key future trends in digital crime and digital terrorism. Satisfactorily provided one (1) overall strategy that the U.S. could use in order to combat digital crime and digital terrorism. Thoroughly gave your opinion of the key future trends in digital crime and digital terrorism. Thoroughly provided one (1) overall strategy that the U.S. could use in order to combat digital crime and digital terrorism. 5. 4 references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present