Key U.S. Laws of Interest to Information Security Professionals

Key U.S. Laws of Interest to Information Security Professionals

The “APA Paper Template: 100-299” posted in the Tutorials & Guides section of the Center for Writing Excellence website, paying specific attention to APA guidelines

The readings, videos, and Learning Team discussions from this week

Table 3-1, “Key U.S. Laws of Interest to Information Security Professionals” of Principles of Information Security

The U.S. has in place many laws related to information security, computer security, and internet use. Many of these laws relate to information governance, accountability, and commercial liability. In addition, the issue of personal privacy is addressed in many of the laws that relate to specific industries, sectors, and types of information.

Write a 1-to 2-page paper using Microsoft® Word that answers the following questions:

For two laws from Table 3.1 in Principles of Information Security, state the overall intent of each law. For example what do the U.S. Police and Justice Act and the Computer Fraud and Abuse Act of the U.K. do?

Using a browser and search engine, determine the general number of cases/complaints that have been filed based on each of the laws listed below:

Computer Fraud and Abuse Act

National Information Infrastructure Protection Act

Sarbanes-Oxley Act

Having reviewed these laws and cases/complaints associated with them, completely answer each of the following:

Which of these laws seemed more frequently enforced? Which of these laws have resulted in a large financial impact to a business? Which of these have imposed a strict punitive damage (e.g., someone being convicted of fraud)?

According to your answer above, what infrastructural or cyber domain sector or assets are being protected by such enforcement?

Accurately explain if the ethical confidentiality of all private information is assured by the three laws

Based on your Learning Team discussion, list at least two conflicts faced by U.S. cloud service providers when providing services globally.

Use APA citation formatting in all work submission. Follow rules of grammar and usage, including spelling and punctuation.

Hello. Thanks, Unfortunately this is all that has been given. This is the only part i need assistance with and cannot find, i have done the rest:

Using a browser and search engine, determine the general number of cases/complaints that have been filed based on each of the laws listed below:

Computer Fraud and Abuse Act

National Information Infrastructure Protection Act

Sarbanes-Oxley Act

Having reviewed these laws and cases/complaints associated with them, completely answer each of the following:

Which of these laws seemed more frequently enforced? Which of these laws have resulted in a large financial impact to a business? Which of these have imposed a strict punitive damage (e.g., someone being convicted of fraud)?

According to your answer above, what infrastructural or cyber domain sector or assets are being protected by such enforcement?

Accurately explain if the ethical confidentiality of all private information is assured by the three laws

Answer preview Key U.S. Laws of Interest to Information Security Professionals

Key U.S. Laws of Interest to Information Security Professionals

APA

388 words