SlideShare a Scribd company logo
1 of 1
Write a 7 page analysis of key legal and ethical issues relevant
to creation and maintenance of a secure enterprise information
security infrastructure. Complete the following:
Discuss the ethical implications of monitoring user compliance
with secure transmission activities as components of a
framework for a secure enterprise information infrastructure.
Describe the legal and ethical issues that relate to monitoring
user compliance with e-mail security policies and procedures as
components of a framework for a secure enterprise information
infrastructure.
Identify resources that can be used to assess the likelihood of
environmental and legal risks.
Describe the major components of cyber defense laws and
policies pertaining to the storage and transmission of data.
Describe the various legal and ethical issues that relate to
specific phases of penetration testing.

More Related Content

Similar to Write a 7 page analysis of key legal and ethical issues relevant.docx

This project is due by the end of the residency weekend. Purpose.docx
This project is due by the end of the residency weekend. Purpose.docxThis project is due by the end of the residency weekend. Purpose.docx
This project is due by the end of the residency weekend. Purpose.docx
rowthechang
 
crucet1crucet2crucet
crucet1crucet2crucetcrucet1crucet2crucet
crucet1crucet2crucet
MargenePurnell14
 
A SYSTEMATIC LITERATURE REVIEW ON SECURITY INDICATORS FOR OPEN-SOURCE ENTERPR...
A SYSTEMATIC LITERATURE REVIEW ON SECURITY INDICATORS FOR OPEN-SOURCE ENTERPR...A SYSTEMATIC LITERATURE REVIEW ON SECURITY INDICATORS FOR OPEN-SOURCE ENTERPR...
A SYSTEMATIC LITERATURE REVIEW ON SECURITY INDICATORS FOR OPEN-SOURCE ENTERPR...
ijseajournal
 
Review the Audit Program for Application Systems for Auditing” .docx
Review the Audit Program for Application Systems for Auditing” .docxReview the Audit Program for Application Systems for Auditing” .docx
Review the Audit Program for Application Systems for Auditing” .docx
michael591
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
EstelaJeffery653
 

Similar to Write a 7 page analysis of key legal and ethical issues relevant.docx (20)

Cis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
 
Cis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.com
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
 
Gs Ch1
Gs Ch1Gs Ch1
Gs Ch1
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
Data Privacy Assessment Checklist.pdf...
Data Privacy Assessment Checklist.pdf...Data Privacy Assessment Checklist.pdf...
Data Privacy Assessment Checklist.pdf...
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Data Privacy Assessment Checklist
Data Privacy Assessment ChecklistData Privacy Assessment Checklist
Data Privacy Assessment Checklist
 
CCA study group
CCA study groupCCA study group
CCA study group
 
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
EXPLORING CRITICAL VULNERABILITIES IN SIEM IMPLEMENTATION AND SOC SERVICE PRO...
 
This project is due by the end of the residency weekend. Purpose.docx
This project is due by the end of the residency weekend. Purpose.docxThis project is due by the end of the residency weekend. Purpose.docx
This project is due by the end of the residency weekend. Purpose.docx
 
crucet1crucet2crucet
crucet1crucet2crucetcrucet1crucet2crucet
crucet1crucet2crucet
 
A SYSTEMATIC LITERATURE REVIEW ON SECURITY INDICATORS FOR OPEN-SOURCE ENTERPR...
A SYSTEMATIC LITERATURE REVIEW ON SECURITY INDICATORS FOR OPEN-SOURCE ENTERPR...A SYSTEMATIC LITERATURE REVIEW ON SECURITY INDICATORS FOR OPEN-SOURCE ENTERPR...
A SYSTEMATIC LITERATURE REVIEW ON SECURITY INDICATORS FOR OPEN-SOURCE ENTERPR...
 
G1803044045
G1803044045G1803044045
G1803044045
 
Review the Audit Program for Application Systems for Auditing” .docx
Review the Audit Program for Application Systems for Auditing” .docxReview the Audit Program for Application Systems for Auditing” .docx
Review the Audit Program for Application Systems for Auditing” .docx
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 

More from fredellsberry

1.Why was Great Britain the first state to have an Industrial Re.docx
1.Why was Great Britain the first state to have an Industrial Re.docx1.Why was Great Britain the first state to have an Industrial Re.docx
1.Why was Great Britain the first state to have an Industrial Re.docx
fredellsberry
 
1.What was the impact of World War I, and what problems did Eu.docx
1.What was the impact of World War I, and what problems did Eu.docx1.What was the impact of World War I, and what problems did Eu.docx
1.What was the impact of World War I, and what problems did Eu.docx
fredellsberry
 
1.Which of the following is a concerted effort by the organizati.docx
1.Which of the following is a concerted effort by the organizati.docx1.Which of the following is a concerted effort by the organizati.docx
1.Which of the following is a concerted effort by the organizati.docx
fredellsberry
 
1.Which one of the following is the estimated rate (i.e., percen.docx
1.Which one of the following is the estimated rate (i.e., percen.docx1.Which one of the following is the estimated rate (i.e., percen.docx
1.Which one of the following is the estimated rate (i.e., percen.docx
fredellsberry
 
1.Which are characteristics of a state Population, territory, s.docx
1.Which are characteristics of a state Population, territory, s.docx1.Which are characteristics of a state Population, territory, s.docx
1.Which are characteristics of a state Population, territory, s.docx
fredellsberry
 
1.Which number below best represents feet above sea level.docx
1.Which number below best represents feet above sea level.docx1.Which number below best represents feet above sea level.docx
1.Which number below best represents feet above sea level.docx
fredellsberry
 

More from fredellsberry (20)

1.Why was Great Britain the first state to have an Industrial Re.docx
1.Why was Great Britain the first state to have an Industrial Re.docx1.Why was Great Britain the first state to have an Industrial Re.docx
1.Why was Great Britain the first state to have an Industrial Re.docx
 
1.Why should Caledonia focus on project free cash flows as opposed t.docx
1.Why should Caledonia focus on project free cash flows as opposed t.docx1.Why should Caledonia focus on project free cash flows as opposed t.docx
1.Why should Caledonia focus on project free cash flows as opposed t.docx
 
1.Which of the following statements concerning the cash flow produc.docx
1.Which of the following statements concerning the cash flow produc.docx1.Which of the following statements concerning the cash flow produc.docx
1.Which of the following statements concerning the cash flow produc.docx
 
1.Why have the governments in almost every country been libera.docx
1.Why have the governments in almost every country been libera.docx1.Why have the governments in almost every country been libera.docx
1.Why have the governments in almost every country been libera.docx
 
1.What would you say to the claim that one mans terrorist is a.docx
1.What would you say to the claim that one mans terrorist is a.docx1.What would you say to the claim that one mans terrorist is a.docx
1.What would you say to the claim that one mans terrorist is a.docx
 
1.Who iswas your transformational leader2.In the space.docx
1.Who iswas your transformational leader2.In the space.docx1.Who iswas your transformational leader2.In the space.docx
1.Who iswas your transformational leader2.In the space.docx
 
1.What similar identity problem do the characters from Ex-Bas.docx
1.What similar identity problem do the characters from Ex-Bas.docx1.What similar identity problem do the characters from Ex-Bas.docx
1.What similar identity problem do the characters from Ex-Bas.docx
 
1.What was the impact of World War I, and what problems did Eu.docx
1.What was the impact of World War I, and what problems did Eu.docx1.What was the impact of World War I, and what problems did Eu.docx
1.What was the impact of World War I, and what problems did Eu.docx
 
1.What types of problems was the consolidatedcity-county gover.docx
1.What types of problems was the consolidatedcity-county gover.docx1.What types of problems was the consolidatedcity-county gover.docx
1.What types of problems was the consolidatedcity-county gover.docx
 
1.What roles will prerelease offender preparation and preventive.docx
1.What roles will prerelease offender preparation and preventive.docx1.What roles will prerelease offender preparation and preventive.docx
1.What roles will prerelease offender preparation and preventive.docx
 
1.What makes one strategy better than another2..docx
1.What makes one strategy better than another2..docx1.What makes one strategy better than another2..docx
1.What makes one strategy better than another2..docx
 
1.Which of the following is a concerted effort by the organizati.docx
1.Which of the following is a concerted effort by the organizati.docx1.Which of the following is a concerted effort by the organizati.docx
1.Which of the following is a concerted effort by the organizati.docx
 
1.Which one of the following is the estimated rate (i.e., percen.docx
1.Which one of the following is the estimated rate (i.e., percen.docx1.Which one of the following is the estimated rate (i.e., percen.docx
1.Which one of the following is the estimated rate (i.e., percen.docx
 
1.Which are characteristics of a state Population, territory, s.docx
1.Which are characteristics of a state Population, territory, s.docx1.Which are characteristics of a state Population, territory, s.docx
1.Which are characteristics of a state Population, territory, s.docx
 
1.Which number below best represents feet above sea level.docx
1.Which number below best represents feet above sea level.docx1.Which number below best represents feet above sea level.docx
1.Which number below best represents feet above sea level.docx
 
1.What, essentially, is the difference between a federal gov.docx
1.What, essentially, is the difference between a federal gov.docx1.What, essentially, is the difference between a federal gov.docx
1.What, essentially, is the difference between a federal gov.docx
 
1.What was the overall goal of the crusades How did they fit .docx
1.What was the overall goal of the crusades How did they fit .docx1.What was the overall goal of the crusades How did they fit .docx
1.What was the overall goal of the crusades How did they fit .docx
 
1.What was the first network television show to depict a main ch.docx
1.What was the first network television show to depict a main ch.docx1.What was the first network television show to depict a main ch.docx
1.What was the first network television show to depict a main ch.docx
 
1.What kind of rock is below the soil in your towncity. How did.docx
1.What kind of rock is below the soil in your towncity. How did.docx1.What kind of rock is below the soil in your towncity. How did.docx
1.What kind of rock is below the soil in your towncity. How did.docx
 
1.What is the independent variable in this study What are the.docx
1.What is the independent variable in this study What are the.docx1.What is the independent variable in this study What are the.docx
1.What is the independent variable in this study What are the.docx
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Write a 7 page analysis of key legal and ethical issues relevant.docx

  • 1. Write a 7 page analysis of key legal and ethical issues relevant to creation and maintenance of a secure enterprise information security infrastructure. Complete the following: Discuss the ethical implications of monitoring user compliance with secure transmission activities as components of a framework for a secure enterprise information infrastructure. Describe the legal and ethical issues that relate to monitoring user compliance with e-mail security policies and procedures as components of a framework for a secure enterprise information infrastructure. Identify resources that can be used to assess the likelihood of environmental and legal risks. Describe the major components of cyber defense laws and policies pertaining to the storage and transmission of data. Describe the various legal and ethical issues that relate to specific phases of penetration testing.