Why did Duronio’s defense attorney, Chris Adams, target CISCO and @Stake Inc. in defense of Duronio, and what was he trying to accomplish?
Answer the following questions in essay format:
Duronio faced charges of computer sabotage, securities fraud, and mail fraud. Identify one or more specific laws applicable to each charge that he was prosecuted under, and why they applied in this case.
Why did Duronio’s defense attorney, Chris Adams, target CISCO and @Stake Inc. in defense of Duronio, and what was he trying to accomplish?
What forensic planning/analysis failure opened the door for this argument?
UBS’s security configuration allowed more than one person to log onto the system at the exact same time using the same USERID and password. Why did this work in the defense’s favor?
Did UBS have a well-formed IT security organization, and how did this affect the trial proceedings?
As an IT security expert or manager assigned to help UBS recover from this incident, what recommendations would you make to them if you were hired as an outside consultant?
Answer preview Why did Duronio’s defense attorney, Chris Adams, target CISCO and @Stake Inc. in defense of Duronio, and what was he trying to accomplish?
APA
1554 words