Week 7 Review and Analysis

In: Computers and Technology

Submitted By kadena19
Words 737
Pages 3
Week 7 Review and Analysis
Keller Graduate School of MGMT
Information Security Law


Chapter 22, Question 3, 4, & 5, Page 739. (Questions found on p743)
Question 3: At one time, in order to demonstrate their alleged intellectual superiority, a number of teenagers broke into computer systems that guarded records of schools, government generally, and the military. What are the current potential criminal risks associated with hacking illegally into computer systems?
For starters, all of the information that is compromised could be sold and used for illegal purposes such as identity theft. Also, if hackers were to hack into the computer systems that control our infrastructure they could possibly turn off or damage our power grids or if they were to hack into the systems that control air traffic control, they could crash airplanes and disrupt travel for millions of people. On a larger scale if hackers were to hack into nuclear power plants they could possibly cause a nuclear meltdown. (GORMAN, 2009)

Question 4: Criminal law statutes now protect your name and identity, your communications, and your ideas. Match each of these categories with the appropriate criminal law statute and explain how each statute can be violated.
Name and identity = “Identity Theft and Assumption Deterrence Act of 1998” (Baumer, 2011). This statute protects individuals from having their identity stolen and used to commit a crime or make purchases in that person’s name that were not initiated by that person.
Communications = “Electronic Communications Privacy Act of 1986” (Baumer, 2011). This statute was initially created to protect individuals from having the companies they worked for from spying on them and revealing information that they illegally obtained. This is a very good law and I personally run into this all the time as a systems administrator. For instance…...

Similar Documents

Week 7 Review and Analysis

...Week 7 Review and Analysis Keller Graduate School of MGMT Information Security Law   Chapter 22, Question 3, 4, & 5, Page 739. (Questions found on p743) Question 3: At one time, in order to demonstrate their alleged intellectual superiority, a number of teenagers broke into computer systems that guarded records of schools, government generally, and the military. What are the current potential criminal risks associated with hacking illegally into computer systems? For starters, all of the information that is compromised could be sold and used for illegal purposes such as identity theft. Also, if hackers were to hack into the computer systems that control our infrastructure they could possibly turn off or damage our power grids or if they were to hack into the systems that control air traffic control, they could crash airplanes and disrupt travel for millions of people. On a larger scale if hackers were to hack into nuclear power plants they could possibly cause a nuclear meltdown. (GORMAN, 2009) Question 4: Criminal law statutes now protect your name and identity, your communications, and your ideas. Match each of these categories with the appropriate criminal law statute and explain how each statute can be violated. Name and identity = “Identity Theft and Assumption Deterrence Act of 1998” (Baumer, 2011). This statute protects individuals from having their identity stolen and used to commit a crime or make purchases in that person’s name that were not...

Words: 737 - Pages: 3

Case Analysi

... SCHOOL PUBLISHING | ONLINE SIMULATIONS 3 Online Simulation Foreground Reading—Finance Simulation: Capital Budgeting interdependent across the spectrum of investment opportunities; others were exclusive.  Many  extended over a multi‐period time horizon and involved a high degree of uncertainty.    New Heritage’s corporate cost of capital was 7.7%.  However, New Heritage assigned discount rates to projects according to a subjective assessment of each project’s risk. High-, medium-, and low-risk categories for each division were associated with a corresponding discount rate set by the capital budgeting committee in consultation with the corporate treasurer.  Assessments of each project’s risk were made at the division level, but subject to review by the capital committee. Factors considered in the assessment of a project’s risk included, for example, whether it required new consumer acceptance or new technology, high levels of fixed costs and hence high breakeven production volumes, the sensitivity of price or volume to macroeconomic recession, the anticipated degree of price competition, and so forth. For example, in 2010, “medium”-risk projects in the production division received a discount rate of 8.4%. High- and low-risk projects were assessed at 9.0% and 7.7%, respectively. Projects that created value indefinitely, given continuing investment, were treated as going concerns with a perpetual life. That is, NPV calculations included a terminal value...

Words: 2246 - Pages: 9

Norstorm Hr Case Analysi

... achievable goals for sales employees and they are given constant feedback by the managers on how to achieve and exceed them. 5. Continue delegating responsibility as is being done by the company. 6. Create a culture where employees associate with the company and want to be there through an incentive plan not necessarily including cash, maybe by rewarding like discounts, free trips . 7. Create a culture of cohesiveness where they feel united and feel proud calling themselves “Nordies”. ----------------------- Strategy 1. Best Customer Service 2. Sales quality and productivity 1. Sales, Sales Promotion 2. After Sales 3. Non Sales Merchandising Leadership 1. Nordstrorm family 2. Decentralization 3. Decision making with front line sales people. 4. Blue collar workers making white collar decisions 1. Group Recognition 2. Peer Pressure 3. Employee Identification with SPH 4. Autonomy and Decision Making 1. Highly Motivated 2.Young 3. College Educated 4. Salary biggest motivator 1. Internal Promotion 2. Offer High Salary as Bait, Enticement for Poaching 3. lack of Job Security...

Words: 917 - Pages: 4

Week 7

...Week 7 2012 Internet Privacy Web Privacy Danielle Worrell XBIS/219 Internet Privacy When it comes to the privacy issues of the internet, I expect to have privacy and security. This is not possible in some instances though. When I use the internet in a public place such as the library, I know that there are many users on there and others may see what I do. This goes along with work as well. They have a secure web but can monitor your usage of the internet therefore seeing anything that you are doing on their internet. Others may not know your security settings for a specific site but it can be saved on a proxy or cookie in the computer. I know that when accessing the web I take my chances even when using it at home, as others can figure out how to sign in on my Wi-Fi. For example, I remember in school when using the computer lab all computers were connected together using the web and you could open a document from any computer using a user name and password. All the documents and usage were saved on a main computer, which was the teacher’s computer. When it comes to being at home and using a Wi-Fi connection, you should have your own connection. It is not legal to use anyone else’s connection unless you have permission from that person to use it. If you see an unsecure network, it is not ethical to use unless you have permission but at the same time, you are able to connect without a pass code. You information and anything you do can be seen by the one who......

Words: 373 - Pages: 2

Week 7

...WEEK 7 INTERMEDIATE ACCOUNTING 1 DEPRECIATION Exercise 11-4 (a) $279,000 – $15,000 = $264,000; $264,000 ÷ 10 yrs. = $26,400 (b) $264,000 ÷ 240,000 units = $1.10; 25,500 units X $1.10 = $28,050 (c) $264,000 ÷ 25,000 hours = $10.56 per hr.; 2,650 hrs. X $10.56 = $27,984 (d) | N(n+1)/2 = 10(11)/2 =55 ……… the total for 2013 is appro. $44,800 | | | (e) | $279,000 X 20% X 1/3 = 18,600 | | | | | Exercise 11-8 June 1, 2010 Purchases $31,800 Freight 200 Installation 500 Total cost $32,500 Book value, old machine, June 1, 2014: | | [$35,200 – $3,000 – ($3,300 X 3)] = | $22,300 | Fair value | (20,000) | Loss on exchange | 2,300 | Cost of removal | 75 | Total loss | $ 2,375 | Basis of new machine | Cash paid ($35,000 – $20,000) | $15,000 | | Fair value of old machine | 20,000 | | Installation cost | 1,500 | | Total cost of new machine | $36,500 | Exercise 11-9 (a) | Asset | | Cost | | Estimated Salvage | | Depreciable Cost | | Estimated Life | | Depreciation per Year | | A | | $ 40,500 | | $ 5,500 | | $ 35,000 | | 10 | | $ 3,500 | | B | | 33,600...

Words: 523 - Pages: 3

Chapter 7 Review Questions

...Chapter 7 Review Questions 1. What is a knowledge management system? a. A Knowledge management system attempt to help organizations achieve their goals. They usually help in means of increasing profits or reducing costs. 2. What is a chief knowledge officer? What are his or her duties? b. A chief knowledge officer is a top level executive who helps the organization work with a knowledge management system to create, store, and use knowledge to achieve organizational goals. The duties that the CKO is responsible for are to work with other executives and vice presidents, including the chief executive officer, chief financial offer and others. 3. What is natural language processing? What are the three levels of voice recognition? c. Natural language processing allows a computer to understand and react to statements and commands made in a “natural” language, like English. The three levels of voice recognition are converting sound waves into words, then the natural language system processing system reacts to the words or commands by performing different tasks. 4. What is a learning system? Give a practical example of such a system. d. A learning system is a combination of software and hardware that allows a computer to change how it functions or reacts to situations based on the feedback it receives. A practical example of such a system would be, some computerized games have learning abilities. If the computer loses a game, it...

Words: 605 - Pages: 3

Business Analysi

...ETEC 522 The Business of eLearning The Phoenix Effect An Environmental Analysis of Apple Inc. Jeff Miller, Alan Doree, David Vogt, Bruce Stewart Jerry BleeckeR MET Program University of British Columbia October 22, 2004 Introduction – “As Bad as it Gets” The year was 1985. Apple Inc., the industry leader in the personal computer industry was bleeding money and floundering in a market it had once dominated. Shares in Apple were trading at an all time low of $7. The company had just announced its first layoff in history and1200 employees were being let go (Goodell, 1996). To make matters worse, Steve Jobs, Apple’s visionary leader had just lost control of the company to John Scully, the former CEO of Pepsi Cola, in a boardroom show down. Jobs was too erratic, it was claimed, and Apple required more steady leadership. Eleven years and two CEO’s later, Apple had still not recovered and teetered on the brink of extinction. It had lost was more than half its market share, and the company now only commanded only 16.5% of sales (Whelan, 98). In addition, it had just posted a $708 million fourth quarter loss and announced a reduction of one-third of its workforce for the second quarter (Goodell, 1996). A shadow of its former self, Apple needed a miracle. It needed a strategic vision and new direction. Ironically, this...

Words: 3798 - Pages: 16

Labor Law Ch 7 Review

...CHAPTER 7: Classification of Employees I. REGULAR 1. those who are engaged to perform necessary or desirable activities for trade of employer, except when employment is fixed for specific term or project 2. casual employees who have rendered atleast (1) year of service, whether continuous or broken, with respect to activity which they’re employed * true despite written agreements that may state employee is not regular (prevent lopsided agreements and manipulations to keep employee on casual status) A. Standards 1. Activities Performed Are Necessary or Desirable In Usual Business of Employer * connection may be made by considering nature of work to be performed and its relation to the scheme of the business in its entirety * De Leon vs NLRC and La Tondena FACTS * Moises de Leon was employed by La Toneda in Dec 11, 1981 * Worked painting building, equipment, other maintenance jobs, cleaning and operating company equipment, assisting Emiliano (reg maintenance man) * Paid daily through petty cash vouchers * Jan 1983: requested to be included in payroll of regular workers, instead of petty cash vouchers * Terminated Moises = filed complaint for illegal dismissal, reinstatement, and payment of backwages * Weeks after dismissal he was rehired indirectly for same job in Vitas-Magsaysay Village Livelihood Council, labor agency of La Tondena * La Tondena claimed that he was only casual, hired to paint a certain building in...

Words: 3315 - Pages: 14

Job Analysi

... organizations that they may be experiencing. These types of problems in organizations can range from employee turnover, employee theft, and employee attitude in the work environment. Researchers can get access to data by looking in major publications or journals produced by associations, and private entities, or by attending annual conferences. Industrial/Organizational psychologists can use different research methods that would include the basic methods, procedures, techniques, and tools used to conduct important research. These basic techniques of scientific method are inductive and deductive reasoning, development of research questions, hypothesis creation, design and implementation of studies, and the nature and definition of constructs form the basis the general areas of Industrial/Organizational psychology (Spector, 2012). Industrial/Organizational psychologists also use many different statistical techniques to analyze the data that important research produces. When looking at Descriptive statistics which is a term given to the analysis of data which help describe, show or summarize data in a meaningful way such that patterns might emerge from the data gathered. Though Descriptive statistics do not allow us to make any conclusions beyond that data that was analyzed or reach any type of conclusion regarding the hypotheses that might have been made. We use descriptive statistics to explain what is happening with the data. With inferential statistics, they would be...

Words: 2421 - Pages: 10

Ehr Chapter 7 Review

...Chapter 7 Review, Page 300 1. A problem list is an up-to-date list of the diagnoses and conditions that affect a particular patient’s care. 2. The idea of a problem list is to ensure that everyone who touches a patient knows what conditions are present. 3. Using a problem list is easy for clinicians to view active and history of problems. Most clinical information recorded in the charts are related to one or more problems. Problem lists are used to track both acute and chronic conditions. It helps clinicians remember to follow up on conditions from previous visits. They actually are required to use a problem list. Maintaining a problem list is a requirement for accreditation by JCAHO. 4. Wellness conditions on the problem list are used to generate preventative care recommendations for healthy patients. It is based on age and sex of the patient and are used in health maintenance and preventative screening programs to keep patients healthy. 5. The data that appears in the manage tab comes from previous encounters or patient visits. 6. Finding a citing means to bring a finding to the current encounter, usually as a follow up to a previous visit. 7. Lab values means to compare the change of certain test components over a period of time. 8. To graph a patient’s weight, all you need to do is click on the graph menu at the very top of the screen to the left, and click weight. 9. Anything with numerical values can be graphed. 10. A......

Words: 368 - Pages: 2

Rel 212 Week 7 Rel212 Week 7

... presented in the readings and resources. This chart, when complete, will be the starting point for the written assignment, due in Week 10. For each weekly submission: 1. Review the weekly lectures and supplemental materials provided, then complete the chart by elaborating on each section related to the weekly content. 2. Identify key details and examples from the weekly resources to serve as a basis for the content being recorded in your chart. 3. Write clearly and coherently using correct grammar, punctuation, spelling, and mechanics. Religion | Origin of All Things | Nature of God | View of Human Nature | View of Good and Evil | View of “Salvation” | View of After Life | Practices and Rituals | Celebrations and Festivals | Week 2 Hinduism and Jainism |   |   |   |   |   |   |   |   | Week 3 Buddhism |   |   |   |   |   |   |   |   | Week 4 Daoism and Confucianism |   |   |   |   |   |   |   |   | Week 5 Shinto |   |   |   |   |   |   |   |   | Week 6 Judaism |   |   |   |   |   |   |   |   | Week 7 Christianity |   |   |   |   |   |   |   |   | Week 8 Islam |   |   |   |   |   |   |   |   | Week 9 Sikhism |   |   |   |   |   |   |   |   | Week 10 Modern Religions |   |   |   |   |   |   |   |   | The specific course learning outcomes associated with this assignment are: * Analyze what is meant by religion. * Analyze the similarities and differences in the primary beliefs held by major religious traditions and the cultures in which these religions...

Words: 5096 - Pages: 21

Acc 220 Week 7 Acc220 Week 7

... managerial accounting? What are the distinguishing features of managerial accounting?  Select a management function— planning, directing and motivating, or controlling—and explain how that function relates to business as a whole. Next, select a different function listed by a classmate. Discuss with your classmate how the functions you each selected complement each other. ACC 220 WEEK 5 CHECKPOINT FINANCIAL REPORTING CheckPoint: Financial Reporting  Write a 200- to 300-word response to the following: Describe how the following financial reports are used internally in a business:  income statement, balance sheet, CVP income statement, statement of cash flows, and retained earnings statement.  Give real world applications by using examples to demonstrate the type of business decisions that are made using these statements. ACC 220 WEEK 6 CHECKPOINT COST, VOLUME AND PROFIT QUESTIONS CheckPoint: Cost, Volume, and Profit Question  Write a 200- to 300-word response that addresses questions 7, 9, & 14 in the Questions section on p. 284–285 of the text. ACC 220 WEEK 6 ASSIGNMENT COST, VOLUME, AND PROFIT FORMULAS Assignment: Cost, Volume, and Profit Formulas   Review the following illustrations found in Ch. 6 of your text: 6-12, 6-15, 6-17, 6-18, 6-19, & 6-20.Write a 350- to 700-word paper that addresses the following: Explain the components of cost-volume-profit analysis. What does each of the components mean? Based on the formulas you have reviewed, what happens to......

Words: 1614 - Pages: 7

Furious 7 Review

...The last Fast and Furious One of the greatest films of 2015 and one that you don’t want to miss is Furious 7. Since 2001 The Fast and the Furious movies have caught the attention of billions of viewers all around the world, especially Furious 7 directed by James Wan. It will have you on the edge of your seat and you won’t want to blink! It is a film about family and how this group of friends have come a long way living their lives in the fast lane trying to keep each other alive as they embarked in new missions every movie. As Dominic Toretto states, “I don't have friends. I got family.” They began to see each other as family ever since Fast Five and now they continue their journey together to fight a man that is after them for revenge. According to Matt Singer “This is a lot of revenge for one movie to contain, and that’s before Dom and the rest of his crew (which also includes computer expert Chris “Ludacris” Bridges and comic relief Tyrese Gibson) hook up with a shadowy government operative named Mr. Nobody (Kurt Russell) and then start skydiving out of planes behind the wheel of their custom cars, a sport I guess we have to call “skydriving” (Singer 1). Everything in this film was great, from actions scenes from begging to end and more action all throughout the movie was insane. You wouldn’t believe the stunts they pulled off in this movie, you have to watch it to believe “skydriving.” David Blaustein states in his review “Not only are the "Furious 7" car chases...

Words: 1264 - Pages: 6

Acc 317 Week 7 Acc317 Week 7

...ACC 317 Complete Course ACC317 Complete Course Click Link for the Answer: http://workbank247.com/q/acc-317-complete-course-acc317-complete-course/21821 http://workbank247.com/q/acc-317-complete-course-acc317-complete-course/21821 ACC 317 Week 1 Discussion "Corporate Tax Resources" Please respond to the following: According to Meyer (2015), clients have business plans and dreams but may have no clue how to structure a company, and they likely don’t know how this important structural decision can affect them down the road.  Please review the article below and the reading for the week and examine at least one (1) advantage and one (1) disadvantage of choosing the corporate structure for income tax purposes. How to help clients pick the best entity for their business.  http://www.journalofaccountancy.com/newsletters/2015/aug/help-clients-pick-best-entity.html#sthash.XkUPB5wb.dpuf ACC 317 Week 1 Homework 1 Homework * Chapter 17: 28, 38, and 45 * Chapter 18: 33 and 44 ACC 317 Week 2 Discussion Executive Compensation” Please respond to the following. In the article in titled Executive Compensation: What's Reasonable?   by Philip Garrett Panitz, the author cautions CPA’s in advising clients on the tax issue of executive compensation. The author suggests that the deductibility of executive compensation is one of the biggest and potentially most dangerous tax issues facing corporations.  Read the article and examine why you think excessive compensation continue to be an issue...

Words: 3530 - Pages: 15

Chapter 7 Review Questions

...1. They’re most like burglar alarms, because they’re both setup to detect intruders and alert users when a threat is detected. 2. A false positive seems like an alert. False negatives seem like normal activity. False positives are just a problem, and false negatives are failures in the systems. 3. A network-based IDPS monitors traffic, and host-based IDPS stays on a particular computer or server and monitors that system. 4. Signature-based IDPS examine data traffic for patterns that match signatures, and behavior-based IDPS collect data from normal traffic and establish a baseline. 5. A switched-port analysis port is a data port on a switched device that copies all designated traffic from the switch device so the traffic can be stored and analyzed for IDPS. 6. In the Centralized control strategy all IDPS control functions are implemented and managed in a central location. Fully-Distributed is the opposite of Centralized, and in this strategy each monitoring site uses its own paired sensors to perform its own control functions to complete necessary detection, reaction, and response functions. 7. Honeypots are decoy systems designed to lure potential attackers away from critical systems. When more than one honeypot is connected to a number of honey pot systems on a subnet it’s called a honeynet. 8. A padded-cell is a tougher honeypot, when its detected attackers it smoothly sends them to a special stimulated environment where they can no longer...

Words: 541 - Pages: 3