Premium Essay

Advanced Software Engineering: Cyber Law

Submitted By
Words 2029
Pages 9
Advanced Software Engineering Spring 2015 Exam #3
Please answer all questions, meeting the minimum word count. Do not copy and paste anything, all words need to be typed by your own fingers.

Explain the 4 areas of cyber law and what they encompass. What is the difference between criminal law, civil law, and administrative law in the area of cyber law? How does Constitutional law differ from the other 3 areas? (200-250 words)

cyberlaw means as the law pf the internet ,computer law and many number of variations.The problem is that none of these nonexclusive description are extremely useful that is, they don't illuminate. The accompanying represent to an endeavor at a depiction that, while longer and totally inadequate with …show more content…
How do they apply to secure software development? (100-200 words)
CIA is a broadly utilized benchmark for evaluation of information systems security, concentrating on the three center objectives of confidentiality, integrity and availability of information
Every time a data innovation group introduces a product application or PC server, breaks down an information transport strategy, makes a database, or gives access to data or information sets, CIA criteria must be addressed.
Confidentiality refers to constraining data access and revelation to approved clients - "the right people" - and counteracting access by or divulgence to unapproved ones - "the wrong people.
Integrity refers to the dependability of information resources. It has the idea of "data integrity"
Availability refers, obviously, to the accessibility of data assets. A information system that is not accessible when you require it is pretty much as awful as none whatsoever. It might be much more terrible, depends upon how reliant the association has ended up on a working computer and communications …show more content…
Loops, If then else etc are programming techniques which are effective in programming. A new variety of programming languages are constructed as structured programming languages.
Pascal was most adopted languages as a programming language not only for mathematical calculations but efficiency and with any restrictions. It was most widely used programming language until mid 1990. It as become most introductory course in the university in computer science. It was the dawn of rise of object oriented paradigm. And support for instances of classes. Function overloading inheritance and polymorphism was common. Pascal gradually decreased its popularity with introductions to programming languages such as

Similar Documents

Premium Essay

Table

...WEEK 1 DAY | MORNING SESSION09:00 – 12:00 | AFTERNOON SESSION14:00 – 17:00 | MONDAY22/06/2015 | * Higher Mathematics 1(Gym) * Business Law (RM 1) * Advanced Project Management(RM 2) * Financial reporting and control(RM 33) * Political Science/Philosophy(RM 36) * digital communications systems(RM 33) | * Electricity and Magnetism(RM 36 & 1) * Research Methodology(Gym) * Operations Management(RM 2) * Media and Communications Ethics(RM 2) * Mobile Communications(RM 2) * Social Work Legal and practice(RM 33) * Employee Engagement (RM 33) | TUESDAY23/06/2015 | * Management Information Systems1(Gym & RM 36) * Java Programming(RM 33) * Mathematics for economics (RM 1) * Software Economics(RM 1) * Media and Society (RM 1) * Marketing(RM 2) * Human Resource Development (RM 2) * Human Rights and Development (RM 2) | * Business Communication/Communication Skills(Gym, RMs 36, 33, 2) * Project Planning and Management Software(Project) * Public Finance(RM 1) * Intermediate macroeconomics 2(RM 1) * Project Appraisal(RM 1) * Wood based Materials &Processes I(RM 1) * Financial Management(RM 1) | WEDNESDAY24/06/2015 | * Media Law(RM 1) * Introduction to Business( Gym) * Introduction to Public Administration(RM 36) * Intermediate microeconomics 1(RM 1) * Cyber Law(Gym) * Food security in Developing Countries(RM 33) * Risk Management(RM 2) * Project Design 1(RM 2) | * Sociology of Education(Gym) *...

Words: 924 - Pages: 4

Premium Essay

The Effect of Cyber-Crime and One Way to Fight Back

...The effect of cyber-crime and one way to fight back Travis Major Lynn University Jeanette Francis 08 June 2013 The cost of cybercrime to businesses For three years now cybercrime has continued to grow. During this time cyber-attacks have more than doubled, while hitting the financial side with an estimated 40 percent increase. The cost of cybercrime study in 2012, conducted by Ponemon Institute, found that cybercrime costs to a random sample of organizations averaged 8.9 million dollars. This spike is estimated to have increased the cost of cybercrime by 6 percent from 2011 and 38 percent from 2010. Also during this study it was discovered that there had been a huge increase of cyber-attacks, approximately 48 percent, with around 102 of them being successful per week. The number of successful attacks per week in 2010 was only around 50. More than 78 percent of the annual cybercrime can be labeled as denial of service, malicious code, malevolent insiders, and stolen or hijacked devices. Businesses have no choice but to spend an increasing amount of money, time, and energy in order to protect themselves against these cyber-attacks that seem to be reaching unsustainable levels. Even though some companies are finding ways to lower the cost of security measures, the cost of time and energy spent cannot be eased. No matter what the solution is, it will always take time to incorporate any security and energy to maintain those securities. Additional key findings include: ...

Words: 1928 - Pages: 8

Premium Essay

Mgt 330 Management Organization

...MGT/330 "The secret of getting ahead is getting STARTED. The secret of getting started is breaking your complex overwhelming tasks into small manageable ones –- then starting on the first one." Mark Twain Boeing was founded in 1916 by William E. Boeing (1881-1956). Currently Boeing is the world’s largest aerospace company and the principal maker of commercial jet transports. Boeing leads the way in developing the single-wing planes in the 1930s; and the first U.S. jetliner, the Boeing 707. Boeing is also a leader in space technology, defense aircraft and systems, and communication systems. According to Boeing successful startup airlines must begin with a sound business plan. Boeings established plan of action has been so successful they publish a guide for starting and running competitive business. Boeing’s detailed planning document typically includes: * Analysis of the market and competition * Brand positioning * Description of the business and opportunity * Details about the operation * Management team biographies * Discussion of risks and obstacles * Pro forma financial statements/projections * Capitalization plan * Brand development * Implementation strategy. (Business Plan, para. 1). Major Components of a Typical Startup-Airline Business Plan include an Executive summary, which covers the business concept including revenue and cost, what market is to be reached, competitive strategies and financial considerations. The...

Words: 1393 - Pages: 6

Free Essay

Carrers

...The United States Air Force Blueprint for Cyberspace November 2, 2009 Foreword Cyberspace is a critical global domain, in which the USAF will conduct integrated operations in support of Joint Force Commanders’ needs. The United States is not alone in recognizing the asymmetrical advantages of this domain. Potential adversaries worldwide are rapidly improving or pursuing their own cyber capabilities. Attempts to disrupt or penetrate our networks are relentless. The blueprint that follows provides a framework to meet these challenges by evolving our culture and improving our capabilities. Air Force Space Command as the lead USAF Major Command (MAJCOM) for cyberspace will execute this blueprint as a unified effort--working closely within the Air Force, and with sister services, combatant commands, Joint Staff and other partners to fully provide the necessary capabilities for the future. C. ROBERT KEHLER General, USAF Commander, AFSPC 2 November 2009 Table of Changes Date 17 Mar 2010 No. 1 Page 13 Description Reference to Minuteman crossed out in Objective 5 Table of Contents Purpose .................................................................................................... 1 Current Situation ................................................................................. 2 Presidential Guidance ........................................................................ 2 Joint Guidance ....................................................................

Words: 4766 - Pages: 20

Premium Essay

Cyber Security and Its Challenges to Society

...------------------------------------------------- Cyber security and its challenges to society Final Project Report Group Members Abdul Majid Qayyum Umair Arshad Hasnat Ahmed Gulraiz Shabbir Contents Introduction: 3 Why is cyber security important? 4 The Impact of Cyber Security 5 The Cultural Impact 5 The Official Impact 5 The Solution Impact 5 Defining Cyber Security 6 Technology & Modern Life 6 What is Cyberspace? 6 What is Cyber Warfare? 6 Cyber is not Hype 7 What Cyber Security Isn’t 7 Cyber-crime 8 Types of Cyber-crimes 8 Hacking: 8 Theft: 8 Cyber Stalking: 9 Identity Theft: 9 Malicious Software: 9 Child soliciting and Abuse: 9 Cyber Bullying 10 Causes of Cyber-crime 10 History of Cyber-crime 10 Cyber-crime in Modern Society 11 Categories of Cyber-crime 11 Individual: 12 Property: 12 Government: 12 How to Tackle Cyber-crime 12 RECENT SURVEY ISSUES ON CYBER SECURITY TRENDS 14 Mobile Devices and Apps 14 Social Media Networking 14 Cloud Computing 14 Protect systems rather Information 15 New Platforms and Devices 15 Everything Physical can be Digital 15 Survey Questions 16 Conclusion 16 Cyber Security and its Challenges to Society Introduction: Over the past several years, experts and policy makers have expressed increasing concerns about protecting internet from cyber-attacks—deliberate attempts by unauthorized persons to access. Many experts expect the number and severity of cyber-attacks to increase over the next several years....

Words: 3707 - Pages: 15

Free Essay

Stuxnet

...dependence on information technologies has led to a relatively new form of security threat – cyber-attacks. Numerous advantages of the attackers in cyber space and a lack of attribution and awareness has resulted in an increasing number of aggressive operations in the digital realm. Contrary to the beliefs of many, cyber security is not exclusively a technical issue but also a matter of politics and economics. We can observe an increasing number cyber warfare policies in the international realm, which increases the pressure to establish rules of governance in cyber space. The following essay will be concerned with the Stuxnet worm and its role in Operation Olympic Games, which targeted the Iranian nuclear power plant Natanz. The analyses will provide an overview of the attack, including technical comprehension of the attack, and also looks at the attack in term of its political consequences. The first section will discuss the origins of the attack, building on Ralph Langner’s article published in ‘IEEE Software’. Even though numerous cyber offences took place before, it will explain what made Stuxnet stand out. The second part of the essay analyses the political perspective of the attack and two competing theories explaining the presence of malware in the nuclear facilities. The following section analyses the role of cyber warfare as viable military strategy. It will be argued that cyber offences appear to be more applicable as an offensive rather than defensive strategy, due...

Words: 2431 - Pages: 10

Free Essay

Russian Patriotic Hacking

...particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating regardless of its size. Global governments need to continue working on creating workable laws that accurately describe the problem of cyberattacks and effectively enforce the solution. The modern world still has a long way to go before all security threats are addressed, appropriate defence is in place and all the critical computer infrastructure is protected from hackers,...

Words: 8586 - Pages: 35

Premium Essay

Syllabus

...Scheme and Syllabus of B.E. (Computer Science and Engineering) 3rd TO 8th Semester 2013-2014 University Institute of Engineering and Technology, Panjab University, Chandigarh Scheme of Examination of B.E. in Computer Science & Engineering Second Year - Third Semester Subject Title Scheme of Teaching Univesity Sr.No Paper Code External L T P Hour Credits Marks s 1. CSE311 Data Structures 3 1 0 4 4 50 2. 3. 4. 5. 6. 7. 8. 9. Total Second Year -Fourth Semester Sr.No Paper Code 1. 2. 3. 4. 5. 6. CSE411 CSE461 CSE412 CSE462 CSE414 CSE464 Subject Title Scheme of Teaching L 3 0 3 0 3 0 T 1 0 1 0 1 0 P 0 3 0 3 0 3 Hours 4 3 4 3 4 3 Credit 4 2 4 2 4 2 University External Marks 50 50 50 CSE361 CSE313 CSE363 AS301 EC316 EC366 EC317 EC367 Data Structures (Practical) Peripheral Devices & Interfaces Hardware Lab (Practical) Engineering Mathematics – III Digital Electronics Digital Electronics (Practical) Microprocessors Microprocessors (Practical) 0 3 0 3 3 0 3 0 15 0 1 0 1 1 0 1 0 5 3 0 2 0 0 2 0 2 09 3 4 2 4 4 2 4 2 29 2 4 1 4 4 1 4 1 25 50 50 50 50 250 Internal Total Sessional Marks 50 50 50 50 50 50 50 50 50 450 100 50 100 50 100 100 50 100 50 700 7. 8. Total ASC405 CSE 415 Analysis & Design of Algorithms Analysis & Design of Algorithms (Practical) Database Management System Database Management System (Practical) Object Oriented Programming Object Oriented Programming (Practical) Cyber Law & IPR Computer Architecture & Organization Internal Total Sessional Marks 50...

Words: 14784 - Pages: 60

Premium Essay

Cybercrimes & Supply Chains

...UNIVERSITY OF MARYLAND UNIVERSITY COLLEGE | The Impact of Cybercrimes on Organization Supply Chains | ASCM 630 Research Paper | TurnItIn Originality Score: 27% | April Dorsey | 4/1/2012 | The paper must follow APA format, be written on an approved topic related to the course, and include discussion of how the topic relates to Acquisition and Supply Chain Management. The paper must list and discuss a minimum of 10 scholarly references (other than websites and the textbook) with at least 5 references that are scholarly journal articles on the topic from UMUC’s online library databases. | ABSTRACT This paper will discuss the impact of cyber crimes on organization supply chain functions, and steps taken to improve supply chain security. Cyber crimes include, but are not limited to, piracy, implanting viruses, netspionage, and credit card fraud. During these times, it is getting easier and easier for computer hackers and frauds to gain access to confidential information from anybody. It could be passwords and social security numbers of individuals, to databases and network systems of large corporations. For businesses, the main supply chain areas at risk are the processes and controls for various departments, such as human resources, finance and accounting, procurement, and marketing. One of the processes at bigger risk is procurement. Majority of companies use other businesses outside their own, like manufacturers and distributors, as part of their purchasing...

Words: 5220 - Pages: 21

Free Essay

Innovation and Erp Systems

...Scheme and Syllabus of B.E. (Computer Science and Engineering) 3 rd th TO 8 Semester 2014-2015 University Institute of Engineering and Technology, Panjab University, Chandigarh DEPARTMENT: COMPUTER SCIENCE AND ENGINEERING VISION: To be recognized as an international leader in Computer Science and Engineering education and research to benefit society globally. MISSION: · · · · To move forward as frontiers of human knowledge to enrich the citizen, the nation, and the world. To excel in research and innovation that discovers new knowledge and enables new technologies and systems. To develop technocrats, entrepreneurs, and business leaders of future who will strive to improve the quality of human life. To create world class computing infrastructure for the enhancement of technical knowledge in field of Computer Science and Engineering. PROGRAMME: B.E. CSE (UG PROGRAMME) PROGRAMME EDUCATIONAL OBJECTIVES: I. Graduates will work as software professional in industry of repute. II. Graduates will pursue higher studies and research in engineering and management disciplines. III. Graduates will work as entrepreneurs by establishing startups to take up projects for societal and environmental cause. PROGRAMME OUTCOMES: A. Ability to effectively apply knowledge of computing, applied sciences and mathematics to computer science & engineering problems. B. Identify, formulate, research literature, and analyze complex computer science & engineering problems reaching substantiated conclusions...

Words: 23989 - Pages: 96

Premium Essay

Cyber Security Act

...Electronics Niketan, Lodhi Road New Delhi – 110003 Discussion draft on National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Your comments/feedback on this document are most welcome. Please send your valuable comments/feedback by 15 May 2011 to Dr Gulshan Rai, Director General, CERT-In, at the at the above address or on email id ‘grai@mit.gov.in’ Discussion draft Department Of Information Technology National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Contents 1.0 Security of Cyber Space – Strategic perspective 1.1 IT as an engine for economic growth and prosperity 1.2 Security of cyber space - Need for action 1.3 Target audience 1.4 Securing cyber space – Key policy considerations 2.0 Cyber space – Nature of threat 2.1 Threat landscape 2.2 International cooperation 2.3 Securing cyber space – Scope of action 2.3.1 Cyber security and cyber defense 2.3.2 Cyber intelligence and cyber defense 2.4 Priorities for action 2.5 Partnership and collaborative efforts 3.0 Enabling processes 3.1 Security threat and vulnerability management 3.2 Security threat early warning and response 3.3 Security best practices - compliance and assurance 3.4 Security crisis management plan for countering cyber attacks and cyber terrorism 3.5 Security legal framework and law enforcement 3.6 Security information sharing and cooperation 4.0 Enabling technologies...

Words: 7888 - Pages: 32

Premium Essay

Cybercrime

...and Communication Technologies (ICT) has become the backbone of many organizations. Particularly, the internet has become an important aspect through which education institutions use to carry out research, communicate and innovate. Even through this evolution has brought many benefits but also it has also brought serious threats such as cyber-attacks that has been demonstrated over the past few years through acts of cyber espionage and cyber-crime through the virtual space. In this context, the University of Dar es Salaam needs to develop policies towards cyber threats even through this has often be clustered and fragmented. Using theoretical and conceptual models this paper provides an informed understanding and critical assessment of the University of Dar es Salaam cyber security policy through addressing the following research questions: What are the IT risk management policy and systems that can be developed for the University of Dar es salaam? The primary data is collected through surveys, and interviews that are open ended and close ended. The results of the paper demonstrated that colleges and universities have been a target for cyber-attacks due to the fact that of the vast amount of computing power they possess, and they provide open access to their constituents and to the public. The research also showed that University of Dar es Salaam doesn’t have a comprehensive IT security risk management policy or guidelines that will guide the business process in the event of...

Words: 7435 - Pages: 30

Free Essay

Foreign Economic Collection 2011

...COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E E X E C U T I V E October 2011 Ta b l e o f C o n t e n t s Executive Summary ................................................................................................................................ i Scope Note ........................................................................................................................................... iii US Technologies and Trade Secrets at Risk in Cyberspace.....................................................................1 The Appeal of Collecting in Cyberspace................................................................................. .....1 Security and attribution ....................................................................................................... 1 Faster and cheaper .............................................................................................................. 2 Extra-territoriality ................................................................................................................ 2 Large but Uncertain Costs........................................................................................................... 3 Pervasive Threat from Intelligence Adversaries and Partners ...............................................................4 China: Persistent Collector..............................................................................................

Words: 11021 - Pages: 45

Free Essay

Frrfrf

...No. 2106 February 8, 2008 Trojan Dragon: China’s Cyber Threat John J. Tkacik, Jr. America’s counterintelligence czar, Dr. Joel F. Brenner, painted an alarming picture of economic espionage in 2006, albeit in the objective tones and neutral parlance of the intelligence community. He reported to Congress that “foreign collection efforts have hurt the United States in several ways”: • Foreign technology collection efforts have “eroded the US military advantage by enabling foreign militaries to acquire sophisticated capabilities that might otherwise have taken years to develop.” • “[M]assive” industrial espionage has “undercut the US economy by making it possible for foreign firms to gain a competitive economic edge over US companies.” Dr. Brenner characterizes China as “very aggressive” in acquiring U.S. advanced technology. “The technology bleed to China, among others, is a very serious problem,” he said in March 2007, noting that “you can now, from the comfort of your own home or office, exfiltrate information electronically from somebody else’s computer around the world without the expense and risk of trying to grow a spy.” On November 15, 2007, the bipartisan, congressionally chartered U.S.–China Economic and Security Review Commission (USCC) put a finer point on it: “Chinese espionage activities in the United States are so extensive that they comprise the single greatest risk to the security of American technolo- gies.” Cyberpenetration is by far China’s most effective...

Words: 8993 - Pages: 36

Free Essay

Hacker Groups

...Hacker Group Submission Christopher Kidd The first hacker group and considered one of the worst I will cover is the group known as the Lizard Squad. This group is mainly known for claims of distributed denial-of-service claims. They targeted to disrupt gaming related services. On September 3, 2014, The group seemingly announced they were disbanding. Later on they seemed to reappear claiming responsibility for attacks on popular websites. Vinnie Omari is the member of the squad that was arrested and then bailed out for fraud by false representation – Fraud Act 2006, conspiracy to steal from another, and unauthorized computer access with the intent to commit other offenses. The first claimed attack from the group was on August 18, 2014. The servers for the game League of Legends were taken offline with a DDoS attack. We will highlight other claims in the following paragraph. On November 23, 2014, Lizard Squad claimed they attacked Destiny servers with a DDoS attack. The PlayStation Network was attacked twice. August 24, 2014 the PlayStation Network was taken down via a DDoS attack, with Lizard Squad claiming responsibility. And again on December 8, 2014, the PlayStation Network was again attacked, purportedly by Lizard Squad. Anyone who attempted to access the PlayStation Store during the time it was down were greeted by the message: "Page Not Found! It's not you. It's the internet's fault." Many others are claimed by them such as Xbox Live DDoS, the Machinima attack...

Words: 742 - Pages: 3