*ISSC-630-WK-7-Ass-Word-500

Assignment Instructions
In order to complete assignment #7 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #7). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 2-full pages in length with a minimum of 3-outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:55 pm Eastern time on Sunday.

1. Find a case involving social engineering. Be sure to explain the case. In this day an age do you believe people still become a victim of social engineering. 

2. Identify and describe four types of countermeasures  that can be used to enhance computer security.

3. What is cyberstalking?  Research the Megan Meier case.  Do you agree with the ruling?

At the time of the Megan Meier suicide, the state of Missouri had the below laws:

SB 0758 – Revises Law Relating to Computer Crimes
565.090 – Includes reference to communications by any means in crime of harassment.
565.225 – Revises definition of “credible threat” relating to crime of stalking to include certain written, electronic or telephonic communications, or certain postings of a site or message.

SB 0070 and SB 255 – Prohibits certain fraudulent use of the Internet effective August 28, 2001

SCS/SBs 70 & 255 – This act prohibits a person from operating an Internet website which causes another person’s computer to dial a telephone number for which a charge is assessed without the other person’s consent. A violation is a Class A misdemeanor unless the long distance charges exceed five hundred dollars, in which case the violation is a Class C felony. The act provides for venue where the victim resides or where the crime occurred. This portion of the act is similar to SB 70.

The act also adds electronic mail messages as a method by which a person may commit the crime of harassment, and prohibits the use of electronic mail to send obscene or indecent commercial messages. This provision is similar to SB 255

Do you think that they should have used these laws to prosecute Drew?

4. Can you become a victim of cyberstalking without using technology?  

find the cost of your paper

Michael Smith

  Purpose of Assignment  In Week 1, students are introduced to the ten fundamental principles on which the study of economics is based. Throughout this course, the students will use….

WK 3 Discussion

  Regardless of political affiliation, individuals often grow concerned when considering perceived competing interests of government and their impact on topics of interest to them. The realm of healthcare is….

Lin Discussion 10

LOOKING BACK AND MOVING FORWARD Resources Attributes and Evaluation of Discussion Contributions. Professional Communications and Writing Guide. Graduate Psychology Discussion Rubric. Congratulations. You have successfully completed the first course in….