100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
C841 Task 1 FINAL.docx C841 Legal Issues in Information Security €“ C841 Task 1 Wes $11.99   Add to cart

Exam (elaborations)

C841 Task 1 FINAL.docx C841 Legal Issues in Information Security €“ C841 Task 1 Wes

 23 views  3 purchases
  • Course
  • Institution

C841 Task 1 FINAL.docx C841 Legal Issues in Information Security €“ C841 Task 1 Wes

Preview 2 out of 7  pages

  • July 22, 2022
  • 7
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU C841

C841 Task 1 1




Legal Issues in Information Security – C841

Task 1



Dylan J. Johnson

Western Governors University




This study source was downloaded by 100000840903812 from CourseHero.com on 07-21-2022 20:03:43 GMT -05:00


https://www.coursehero.com/file/93024049/C841-Task-1-FINALdocx/

, C841 Task 1 2


Relevancy of the Computer Fraud and Abuse Act (CFAA)
CFAA addresses the compromise of confidentiality against a protected computer, which
is any federal computer, financial computer, or any computer used in interstate or foreign
commerce. Within the case study, the Business Intelligence (BI) Unit of TechFite utilized fake
user accounts to gain unauthorized access to computers in TechFite’s financial department which
resulted in the loss of confidentiality of these systems. By compromising the confidentiality of
these finance computers, the Business Intelligence Unit violated the Computer Fraud and Abuse
Act because the TechFite finance computers are considered protected computers due to their role
in interstate.
Relevancy of the Electronic Communications Privacy Act (ECPA)
The ECPA addresses unauthorized access to electronic communications, whether stored
on a hard drive or in transit over the network. Within the case study, Sarah Miller from
TechFite’s BI unit conducted scanning activity into the private networks of several Internet-based
companies. Because these internal communications were within the private networks of outside
companies, Sarah Miller violated the Electronic Communications Privacy Act.
Three Laws that Justify Legal Action
Three laws that can be used in the justification of legal action against negligent activity
observed within the TechFite case study are the Computer Fraud and Abuse Act (CFAA), the
Sarbanes-Oxley Act of 2002 (SOX), and the Electronic Communications Privacy Act (ECPA).
Computer Fraud and Abuse Act
The CFAA addresses the unauthorized trafficking of computer access information that
allows people to access other computers without authorization and with the intent to defraud.
Within the case file, fake company accounts were created then given increased privileges which
were used to access computers from the legal, human resources, and finance departments without
authorization. The Chief Information Security Officer was negligent by not ensuring that all user
accounts are valid and have the appropriate permissions. The CFAA applies to this instance
because the fake user accounts gave unauthorized access to several departments' computer
systems which the criminals intended to use to defraud the company.
Sarbanes-Oxley Act of 2002
SOX addresses the retention and control that companies must maintain over internal
financial documents. SOX applies in the justification of legal action for this case because the
company was negligent in providing internal oversight within the company, which is required by
SOX to ensure the company is employing appropriate controls to protect the integrity and
confidentiality of its internal documentation.
Electronic Communications Privacy Act
The ECPA addresses the restriction of accessing stored electronic communications. These
electronic communications can be in transit over airways or across the wire. Within the case



This study source was downloaded by 100000840903812 from CourseHero.com on 07-21-2022 20:03:43 GMT -05:00


https://www.coursehero.com/file/93024049/C841-Task-1-FINALdocx/

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78861 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.99  3x  sold
  • (0)
  Add to cart