1. CIS 170 Week 1 Discussion Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-1-discussion-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 1 Discussion NEW
Two factors that have led to the explosive growth of
digital crime over the past few decades are:
•Increasing use of computers and or computing devices
by virtually ¾ citizens, because of this device have
provided constant opportunities for
cybervictimizations.
2. •The ongoing increase of availability of technical
information on virus creation and computer hacking
techniques that’s enabling even more technical and
savvy computer criminals.
3. CIS 170 Week 2 Discussion Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-2-discussion-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 2 Discussion
"Digital Terrorism and Criminology of Computer Crime"
List at least three major categories of cyber terrorism
and / or information warfare. Among the
chosencategories, determine the one that should be the
top priority for the federal government to address.
Provide a rationale to support your response.
4. CIS 170 Week 3 Assignment 1 Cyber Computer Crime
Recent (2 PPT's)
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-3-assignment-1-cyber-
computer-crime-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 3 Assignment 1 Cyber Computer Crime
NEW
Assignment 1: Cyber Computer Crime
Due Week 3 and worth 75 points
5. Create a 15-slide presentation or 10-minute video
presentation using Kaltura in which you:
1. Describe the responsibilities of the National
Security Administration (NSA).
2. Identify the four critical needs at the state or local
level of law enforcement in order to fight computer
crime more effectively.
3. Explain how the U.S. Postal Service assists in the
investigation and prosecution of cases involving child
pornography.
4. Discuss how and why the Department of Homeland
Security (DHS) consolidated so many federal offices.
Use at least three (3) quality references for this
assignment. One of these must have been published
within the last year. Note: Wikipedia and similar
websites do not qualify as quality resources.
6. Presentation Pro Tips:
· Practice, practice, practice. Say it over and over
again so that you come across cool and collected and
your information isn’t lost in your nervousness or
verbal stops (um, er, uh).
· PowerPoints should have only a single thought on
each slide and complete sentences are not necessary.
Sometimes a single word with a good graphic or just a
strong graph is all you need.
· Use 18 point font or larger. (18 point font is the
smallest that can be read from across the room.)
· Relax. You know the information. Now you’re just
showing it.
7. Your assignment must follow these formatting
requirements:
· This course requires use of new Strayer Writing
Standards (SWS). The format is different than other
Strayer University courses. Please take a moment to
review the SWS documentation for details.
Include a cover page containing the title of the
assignment, the student’s name, the professor’s name,
the course title, and the date. The cover page and the
reference page are not included in the required
presentation length.
The specific course learning outcomes associated with
this assignment are:
· Describe the criminology of computer crime.
8. · Explain the various digital laws and legislation in
support of law enforcement.
· Use technology and information resources to
research issues in information technology in criminal
justice.
Write clearly and concisely about information
technology in criminal justice topics using proper
writing mechanics and technical style conventions
9. CIS 170 Week 3 Discussion Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-3-discussion-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 3 Discussion
"Hackers and Cyber Criminal Organizations"
• From the first and second e-Activities, explain the
hacker ethic and hacker manifesto. Give your opinion as
to why hackers do not consider themselves to be
criminals. Include one example of such types of hackers
to support your response
10. • Describe at least two ways in which organized crime
uses social media sites for its benefits. Next, speculate
on the measures that the government could take in
order to combat digital crimes perpetrated through
social media sites. Provide a rationale for your response.
11. CIS 170 Week 4 Discussion Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-4-discussion-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 4 Discussion
White Collar Crimes"
Please respond to the following:
• Describe the main similarities and differences between
corporate espionage offenders who are so-called
“insiders” and those who are so-called “outsiders”. In
12. your discussion, include the main effects, incidence of,
and potential costs associated with each type of
corporate espionage.
13. CIS 170 Week 5 Discussion Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-5-discussion-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 5 Discussion NEW
"Virus and Malicious Code"
14. Please respond to the following:
• From the first reading, explain the key differences
between viruses and other malicious codes. Identify at
least three different types of viruses, and describe the
main differences between each one. Next, explain both
the potential threat posed by viruses and other
malicious codes and their main effects on computers
and productivity.
• From the second, discuss the fundamental lesson(s)
that we can learn from the attacks of viruses andother
malicious codes. Speculate on the main steps that both
individuals and businesses can take in order to protect
themselves from attacks that may occur in the future.
15. CIS 170 Week 6 Assignment 2 Hacking Theory Recent (2
Papers)
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-6-assignment-2-hacking-
theory-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 6 Assignment 2 Hacking Theory NEW (2
Papers)
Assignment 2: Hacking Theory
Due Week 6 and worth 75 points
Write a paper in which you:
16. 1. Explain the various forms of social engineering
tactics that hackers employ and provide a recent
example of each.
2. Describe the five social norms of hacker subculture
and provide an example of each.
3. Search Internet news sources and find a recent
article (less than 1 year old) on hacking. Describe the
tone in regard to hacking and explain what the article
conveys in regard to stigmas and labels surrounding the
hacker.
4. Use at least three (3) quality references for this
assignment. One must have been published within the
last year. Note: Wikipedia and similar websites do not
qualify as quality resources.
17. Your assignment must follow these formatting
requirements:
· This course requires use of new Strayer Writing
Standards (SWS). The format is different than other
Strayer University courses. Please take a moment to
review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font
(size 12), with one-inch margins on all sides; citations
and references must follow SWS or school-specific
format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the
assignment, the student’s name, the professor’s name,
the course title, and the date. The cover page and the
reference page are not included in the required
assignment page length.
18. The specific course learning outcomes associated with
this assignment are:
· Describe the technologies and processes involved in
digital forensics.
· Explain the ethical concerns that information
technologies raise in society and the impact of
information technologies on crime, terrorism, and war.
· Use technology and information resources to
research issues in information technology in criminal
justice.
Write clearly and concisely about information
technology in criminal justice topics using proper
writing mechanics and technical style conventions
19. CIS 170 Week 6 Discussion Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-6-discussion-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 6 Discussion NEW
"Internet Exploitation and Primary Federal Law"
Please respond to the following:
20. •From the reading, select two types of online traps that
have the most adverse impact on children. Next,
speculate on one way not discussed in the article in
which parents or society can protect children from
online exploitation. Provide a rationale for your
response.
21. CIS 170 Week 7 Discussion Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-7-discussion-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 7 Discussion
"Digital Laws and Legislation”
Please respond to the following:
• Identify one evidentiary issue that could be presented
regarding the admission of digital evidence at trial. Next,
22. suggest one way in which the court could take to resolve
the issue that you have identified.Include one example
of such issue and your suggestion action to support your
response.
23. CIS 170 Week 8 Assignment 3 USA Patriot Act Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-8-assignment-3-usa-patriot-
act-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 8 Assignment 3 USA Patriot Act
Assignment 3: USA PATRIOT Act
Due Week 8 and worth 75 points
24. Write a paper in which you:
Explain what the USA PATRIOT Act stands for and
discuss its primary purpose
Summarize an article about a recent example of a hate
crime (within the last year) on the Internet and include
why it was a hate crime, the characteristics that made it
a hate crime, and how the police and court responded to
the hate crime.
Compare the characteristics of intelligence and
investigation and describe how the information from
each is used.
4. Use at least three (3) quality references for this
assignment, including the initial article. One must have
been published within the last year. Note: Wikipedia and
similar websites do not qualify as quality resources.
Your assignment must follow these formatting
requirements:
25. · This course requires use of new Strayer Writing
Standards (SWS). The format is different than other
Strayer University courses. Please take a moment to
review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font
(size 12), with one-inch margins on all sides; citations
and references must follow SWS or school-specific
format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the
assignment, the student’s name, the professor’s name,
the course title, and the date. The cover page and the
reference page are not included in the required
assignment page length.
The specific course learning outcomes associated with
this assignment are:
26. · Explain the various digital laws and legislation in
support of law enforcement.
· Explain the ethical concerns that information
technologies raise in society and the impact of
information technologies on crime, terrorism, and war.
· Use technology and information resources to
research issues in information technology in criminal
justice.
Write clearly and concisely about information
technology in criminal justice topics using proper
writing mechanics and technical style conventions
27. CIS 170 Week 8 Discussion Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-8-discussion-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 8 Discussion
"The Investigation of Computer-Related Crime"
Please respond to the following:
• From the reading, there are general principles that
investigators must follow when they respond to any
28. crime scene in which computers and electronic
technology may be involved. Suggest at least two general
principles for proper evidence preservation for stand-
alone personal computers, networked home personal
computers, and network server business networks.
Provide a rationale for your response
29. CIS 170 Week 9 Discussion Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-9-discussion-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 9 Discussion
Digital Forensics" Please respond to the following:
• From the first reading, discuss the fundamental
advantages that the commercial forensic packages
offered to forensic investigators. Next, speculate on
whether there is an overall disadvantage(s) to using
31. CIS 170 Week 10 Assignment 4 The Future of Cyber
Crimes and Cyber Terrorism Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-10-assignment-4-the-future-
of-cyber-crimes-and-cyber-terrorism-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 10 Assignment 4 The Future of Cyber
Crimes and Cyber Terrorism
Assignment 4: The Future of Cyber Crimes and Cyber
Terrorism
32. Due Week 10 and worth 75 points
In the United States, a number of law enforcement
agencies, including the Secret Service, the Federal
Bureau of Investigation (FBI), and the Department of
Homeland Security, among others, have taken on roles
to fight computer crimes and terrorism.
Use the Internet or Strayer library to research articles
on the efforts of law enforcement agencies to combat
cyber crimes and cyber terrorism, as well as the roles of
such agencies in the future of the combat in question.
33. Create a 15-slide presentation or 10-minute video
presentation using Kaltura in which you address the
following:
Explain how the process of digital evidence is similar to
the process of traditional crime scene evidence.
Identify some of the best sources of digital evidence for
child abuse and exploitation, domestic violence, and
gambling according to the National Institute of Justice.
Smartphones contain digital data and are often a key
source of information for crimes. Summarize a criminal
case in which a smartphone was a critical component in
obtaining a conviction, focusing on how the digital
forensics from the phone was utilized in the case.
Describe Brothers' steps for forensic analysis of mobile
devices.
34. Use at least four (4) quality references for this
assignment. Note: Wikipedia and similar websites do
not qualify as quality resources.
Presentation Pro Tips:
· Practice, practice, practice. Say it over and over
again so that you come across cool and collected and
your information isn’t lost in your nervousness or
verbal stops (um, er, uh).
· PowerPoints should have only a single thought on
each slide and complete sentences are not necessary.
Sometimes a single word with a good graphic or just a
strong graph is all you need.
· Use 18 point font or larger. (18 point font is the
smallest that can be read from across the room.)
35. · Relax. You know the information. Now you’re just
showing it.
Your assignment must follow these formatting
requirements:
· This course requires use of new Strayer Writing
Standards (SWS). The format is different than other
Strayer University courses. Please take a moment to
review the SWS documentation for details.
Include a cover page containing the title of the
assignment, the student’s name, the professor’s name,
the course title, and the date. The cover page and the
reference page are not included in the required page
length.
36. The specific course learning outcomes associated with
this assignment are:
· Describe the criminology of computer crime.
· Describe the technologies and processes involved in
digital forensics.
· Use technology and information resources to
research issues in information technology in criminal
justice.
Write clearly and concisely about information
technology in criminal justice topics using proper
writing mechanics and technical style conventions
37. CIS 170 Week 10 Discussion Recent
Check this A+ tutorial guideline at
http://www.uopassignments.com/cis-170-
strayer/cis-170-week-10-discussion-recent
For more classes visit
http://www.uopassignments.com
CIS 170 Week 10 Discussion
Information Security and Digital Crime and Terrorism"
Please respond to the following:
• From the first reading, identify one to two potential
ethical challenges that security professionals may face
as technology advances, applications become more
mobile, and computer criminals become more
38. innovative. Speculate on one solution that security
professional could take in order to mitigate the
challenge(s) in question. Justify your response.